header-logo
Suggest Exploit
vendor:
ChurchCRM
by:
Rahad Chowdhury
4.8
CVSS
MEDIUM
Reflected XSS
79
CWE
Product Name: ChurchCRM
Affected Version From: 4.5.2004
Affected Version To: 4.5.2004
Patch Exists: NO
Related CWE: CVE-2023-31699
CPE: a:churchcrm:churchcrm:4.5.4
Metasploit:
Other Scripts:
Platforms Tested: Windows 10, PHP 7.4.29, Apache 2.4.53
2023

ChurchCRM v4.5.4 – Reflected XSS via Image (Authenticated)

The ChurchCRM v4.5.4 software is vulnerable to a reflected cross-site scripting (XSS) attack. An authenticated attacker can upload a specially crafted image file containing XSS payload and exploit the vulnerability by tricking a user into viewing the image, resulting in the execution of malicious script code within the user's browser.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user input and validate image files before allowing them to be uploaded. Implementing a strict content security policy (CSP) can also help prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated)
# Date: 2023-04-17
# Exploit Author: Rahad Chowdhury
# Vendor Homepage: http://churchcrm.io/
# Software Link: https://github.com/ChurchCRM/CRM/releases/tag/4.5.4
# Version: 4.5.4
# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53
# CVE: CVE-2023-31699

Steps to Reproduce:

1. At first login your admin panel.
2. Then click the "Admin" menu and click "CSV Import '' and you will get
the CSV file uploader option.
3. now insert xss payload in jpg file using exiftool or from image
properties and then upload the jpg file.
4. you will see XSS pop up.