CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39304

Medium Severity
Churchcrm
SVRS
30/100

CVSSv3
8.8/10

EPSS
0.0054/1

CVE-2024-39304 is an authenticated SQL injection vulnerability in ChurchCRM, an open-source church management system. Prior to version 5.9.2, the application fails to properly sanitize user input, allowing attackers with valid credentials to inject SQL statements via the EID parameter in /GetText.php. Although the CVSS score is 8.8, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a lower real-world risk compared to the theoretical maximum. Exploitation requires authentication, but no elevated privileges are needed. By injecting malicious SQL code, attackers could potentially read, modify, or delete sensitive database information. Upgrade to version 5.9.2 to mitigate this vulnerability. While 'In The Wild', the low SVRS suggests exploitation is not widespread at this time, but patching remains crucial.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2024-07-26

2024-09-19
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-39304 is an authenticated SQL injection vulnerability in ChurchCRM, an open-source church management system. It allows attackers to inject SQL statements into the database query due to improper sanitization of user input. The vulnerability has a CVSS score of 8.8, indicating high severity. However, the SOCRadar Vulnerability Risk Score (SVRS) is 50, suggesting a moderate level of urgency.

Key Insights:

  • Authentication Required: Attackers need to be authenticated to exploit this vulnerability, but no elevated privileges are necessary.
  • SQL Injection: The vulnerability allows attackers to execute arbitrary SQL queries on the database, potentially leading to data theft, modification, or deletion.
  • Active Exploitation: The vulnerability is actively exploited in the wild, making it a high-priority threat.

Mitigation Strategies:

  • Update to Version 5.9.2: The vendor has released version 5.9.2, which patches the vulnerability. Users should update to this version immediately.
  • Implement Input Validation: Implement robust input validation mechanisms to prevent malicious SQL queries from being executed.
  • Use a Web Application Firewall (WAF): A WAF can help detect and block malicious SQL injection attempts.
  • Monitor for Suspicious Activity: Monitor logs and network traffic for any suspicious activity that may indicate an SQL injection attack.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-39304 | ChurchCRM up to 5.9.1 /GetText.php EID sql injection (GHSA-2rh6-gr3h-83j9)
vuldb.com2024-07-26
CVE-2024-39304 | ChurchCRM up to 5.9.1 /GetText.php EID sql injection (GHSA-2rh6-gr3h-83j9) | A vulnerability, which was classified as critical, has been found in ChurchCRM up to 5.9.1. Affected by this issue is some unknown functionality of the file /GetText.php. The manipulation of the argument EID leads to sql injection. This vulnerability is handled as CVE-2024-39304<
cve-2024-39304
domains
urls
cves

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppChurchcrmchurchcrm

References

ReferenceLink
[email protected]https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08
[email protected]https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9
GITHUBhttps://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence