First published: Fri Aug 05 2005(Updated: )
Multiple SQL injection vulnerabilities in ChurchInfo allow remote attackers to execute arbitrary SQL commands via the PersonID parameter to (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, or (7) UserDelete.php, (8) DepositSlipID parameter to DepositSlipEditor.php, (9) QueryID parameter to QueryView.php, GroupID parameter to (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, or (15) /Reports/GroupReport.php, (16) PropertyID parameter to PropertyEditor.php, FamilyID parameter to (17) Canvas05Editor.php, (18) CanvasEditor.php, or (19) FamilyView.php, or (20) PledgeID parameter to PledgeDetails.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Church Management System | =1.2.2 | |
Church Management System | =1.1.5 | |
Church Management System | =1.1.3 | |
Church Management System | =1.1.2 | |
Church Management System | =1.2.0 | |
Church Management System | =1.1.4 | |
Church Management System | =1.1.6 | |
Church Management System | =1.1.1 | |
Church Management System | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2473 is classified as a medium severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2005-2473, upgrade to a non-vulnerable version of ChurchInfo and implement proper input validation to prevent SQL injection.
CVE-2005-2473 affects ChurchInfo versions 1.1.1 through 1.2.2.
CVE-2005-2473 allows remote attackers to perform arbitrary SQL commands, potentially leading to data exposure or modification.
While CVE-2005-2473 may not be widely reported today, SQL injection vulnerabilities are a common issue in web applications.