First published: Mon Jun 13 2022(Updated: )
Church Management System version 1.0 is affected by a SQL anjection vulnerability through creating a user with a PHP file as an avatar image, which is accessible through the /uploads directory. This can lead to RCE on the web server by uploading a PHP webshell.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Church Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41661 is a SQL injection vulnerability in Church Management System version 1.0.
CVE-2021-41661 is exploited by creating a user with a PHP file as an avatar image, which is accessible through the /uploads directory, leading to remote code execution on the web server by uploading a PHP webshell.
CVE-2021-41661 has a severity rating of 9.8 (Critical).
To fix CVE-2021-41661, it is recommended to update Church Management System to a version that addresses the SQL injection vulnerability.
You can find more information about CVE-2021-41661 at the following link: [https://github.com/janikwehrli1/0dayHunt/blob/main/Church_Managementv1.0_RCE.py]