| Summary | ChurchInfo allows remote attackers to execute obtain sensitive information via the PersonID parameter to (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, or (7) UserDelete.php, an invalid Number parameter to (8) SelectList.php or (9) SelectDelete.php, GroupID parameter to (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, or (15) /Reports/GroupReport.php, (16) PropertyID parameter to PropertyEditor.php, FamilyID parameter to (17) Canvas05Editor.php, (18) CanvasEditor.php, or (19) FamilyView.php, or (20) PledgeID parameter to PledgeDetails.php, which reveal the path in an error message. |
|---|---|
| Publication Date | Aug. 5, 2005, 1 p.m. |
| Registration Date | Jan. 29, 2021, 5:58 p.m. |
| Last Update | July 11, 2017, 10:32 a.m. |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:churchinfo:churchinfo:1.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:churchinfo:churchinfo:1.2.2:*:*:*:*:*:*:* | |||||