7.4 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.01 Low
EPSS
Percentile
83.6%
ChurchInfo allows remote attackers to execute obtain sensitive information via the PersonID parameter to (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, or (7) UserDelete.php, an invalid Number parameter to (8) SelectList.php or (9) SelectDelete.php, GroupID parameter to (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, or (15) /Reports/GroupReport.php, (16) PropertyID parameter to PropertyEditor.php, FamilyID parameter to (17) Canvas05Editor.php, (18) CanvasEditor.php, or (19) FamilyView.php, or (20) PledgeID parameter to PledgeDetails.php, which reveal the path in an error message.
marc.info/?l=bugtraq&m=112291550713546&w=2
secunia.com/advisories/16292
securitytracker.com/id?1014617
www.osvdb.org/18425
www.osvdb.org/18426
www.osvdb.org/18429
www.osvdb.org/18430
www.osvdb.org/18431
www.osvdb.org/18432
www.osvdb.org/18433
www.osvdb.org/18434
www.osvdb.org/18435
www.osvdb.org/18436
www.osvdb.org/18437
www.osvdb.org/18438
www.osvdb.org/18439
www.osvdb.org/18450
exchange.xforce.ibmcloud.com/vulnerabilities/21648