Google Urchin version 5.7.03 suffers from a local file inclusion vulnerability.
5e4cb1f96abd4d0dba19822c6f4cb88dbe18e99c1e9e68021ef02e64759e4502
This Metasploit module exploits the logic in the CartView.php page when crafting a draft email with an attachment. By uploading an attachment for a draft email, the attachment will be placed in the /tmp_attach/ folder of the ChurchInfo web server, which is accessible over the web by any user. By uploading a PHP attachment and then browsing to the location of the uploaded PHP file on the web server, arbitrary code execution as the web daemon user (e.g. www-data) can be achieved.
d722a625744f0e9dc54c97184f41f3a6b314c7e49874af507dfdc2295535278e
Secunia Security Advisory - Multiple vulnerabilities have been discovered in ChurchInfo, which can be exploited by malicious users to conduct SQL injection attacks and malicious people to conduct cross-site request forgery attacks.
14f2c79582bdea0b4b391aa1a02fe062c1bb047847293526a9d07edc7c887f56
ChurchInfo versions 1.2.12 and below suffer from a remote SQL injection vulnerability.
eec17a6657cd7a6bef191aaf714616f4f50fd38065ac04c7498ca2bdba360e94
Google Urchin version 5.7.03 local file inclusion exploit.
6e4a248133ec68df035e49c941cd319ec7ea7bc8646e969f03155b233c5217e3
There is a trivially exploitable cross site scripting vulnerability on Google Urchin Web Analytics 5's login page. The vulnerability has been tested on versions 5.6.00r2, 5.7.01, 5.7.02 and 5.7.03 (latest). Previous versions are most likely affected as well.
ce3274e7eb56501ab425cb2bd6f2fdb2ee07e64757d3163190677f1bb8761e3f
Secunia Security Advisory - r0t has reported some vulnerabilities in Urchin, which can be exploited by malicious people to conduct cross-site scripting attacks.
118d6617ce62e0a6a8fa40129512489ea0e4711eb684a1ef5cf2a6ef057dd731
ChurchInfo is susceptible to multiple path disclosure and SQL injection attacks.
73a6668e42877f21013a42244916fca67cffcafb36e829d4c99e49634370bab7
Secunia Security Advisory - thegreatone2176 has discovered some vulnerabilities in ChurchInfo, which can be exploited by malicious users to conduct SQL injection attacks.
c2d42c679e1cf97b26a4d159020fb8d845b8d334e4cecd43fcc0d2adcb6223b7