CVE-2024-39304
Churchcrm
CVE-2024-39304 is an authenticated SQL injection vulnerability in ChurchCRM, an open-source church management system. Prior to version 5.9.2, the application fails to properly sanitize user input, allowing attackers with valid credentials to inject SQL statements via the EID parameter in /GetText.php
. Although the CVSS score is 8.8, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a lower real-world risk compared to the theoretical maximum. Exploitation requires authentication, but no elevated privileges are needed. By injecting malicious SQL code, attackers could potentially read, modify, or delete sensitive database information. Upgrade to version 5.9.2 to mitigate this vulnerability. While 'In The Wild', the low SVRS suggests exploitation is not widespread at this time, but patching remains crucial.
Description:
CVE-2024-39304 is an authenticated SQL injection vulnerability in ChurchCRM, an open-source church management system. It allows attackers to inject SQL statements into the database query due to improper sanitization of user input. The vulnerability has a CVSS score of 8.8, indicating high severity. However, the SOCRadar Vulnerability Risk Score (SVRS) is 50, suggesting a moderate level of urgency.
Key Insights:
- Authentication Required: Attackers need to be authenticated to exploit this vulnerability, but no elevated privileges are necessary.
- SQL Injection: The vulnerability allows attackers to execute arbitrary SQL queries on the database, potentially leading to data theft, modification, or deletion.
- Active Exploitation: The vulnerability is actively exploited in the wild, making it a high-priority threat.
Mitigation Strategies:
- Update to Version 5.9.2: The vendor has released version 5.9.2, which patches the vulnerability. Users should update to this version immediately.
- Implement Input Validation: Implement robust input validation mechanisms to prevent malicious SQL queries from being executed.
- Use a Web Application Firewall (WAF): A WAF can help detect and block malicious SQL injection attempts.
- Monitor for Suspicious Activity: Monitor logs and network traffic for any suspicious activity that may indicate an SQL injection attack.
Additional Information:
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: Active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.