CVE-2022-41406
https://notcve.org/view.php?id=CVE-2022-41406
An arbitrary file upload vulnerability in the /admin/admin_pic.php component of Church Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. Una vulnerabilidad de descarga de archivos arbitraria en el componente /admin/admin_pic.php de Church Management System versión 1.0 permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/CokuTau-CH/Bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/RCE-1.md • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2022-38595
https://notcve.org/view.php?id=CVE-2022-38595
Church Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/edit_user.php. Se ha detectado que Church Management System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro id en el archivo /admin/edit_user.php • https://github.com/Estbonxby/bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/SQLi-2.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-38594
https://notcve.org/view.php?id=CVE-2022-38594
Church Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/edit_visitor.php. Se ha detectado que Church Management System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro id en el archivo /admin/edit_visitor.php • https://github.com/Estbonxby/bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/SQLi-1.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-38605
https://notcve.org/view.php?id=CVE-2022-38605
Church Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/edit_event.php. Se ha detectado que Church Management System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro id en el archivo /admin/edit_event.php • https://github.com/sunaono1/bug_report/blob/main/vendors/Godfrey%20De%20Blessed/church-management-system/SQLi-1.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-2680 – SourceCodester Church Management System login.php sql injection
https://notcve.org/view.php?id=CVE-2022-2680
A vulnerability classified as critical has been found in SourceCodester Church Management System 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument username with the input ' OR (SELECT 7064 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(7064=7064,1))),0x716b707871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- jURL leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/anx0ing/CVE_demo/blob/main/2022/Church%20Management%20System-SQL%20injections.md https://vuldb.com/?id.205668 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •