{ "schema_version": "1.4.0", "id": "GHSA-2j4g-q4pc-fmcw", "modified": "2022-06-28T00:00:57Z", "published": "2022-06-14T00:00:21Z", "aliases": [ "CVE-2021-41661" ], "details": "Church Management System version 1.0 is affected by a SQL anjection vulnerability through creating a user with a PHP file as an avatar image, which is accessible through the /uploads directory. This can lead to RCE on the web server by uploading a PHP webshell.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41661" }, { "type": "WEB", "url": "https://github.com/janikwehrli1/0dayHunt/blob/main/Church_Managementv1.0_RCE.py" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-06-13T23:15:00Z" } }