CartView.php in ChurchInfo 1.3.0 allows attackers to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.
History

Mon, 28 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-11-23T00:00:00.000Z

Updated: 2025-04-28T20:20:38.840Z

Reserved: 2021-11-02T00:00:00.000Z

Link: CVE-2021-43258

cve-icon Vulnrichment

Updated: 2024-08-04T03:55:28.389Z

cve-icon NVD

Status : Modified

Published: 2022-11-23T19:15:11.823

Modified: 2025-04-28T21:15:55.753

Link: CVE-2021-43258

cve-icon Redhat

No data.