CartView.php in ChurchInfo 1.3.0 allows attackers to achieve remote code execution through insecure uploads. This requires authenticated access tot he ChurchInfo application. Once authenticated, a user can add names to their cart, and compose an email. Uploading an attachment for the email stores the attachment on the site in the /tmp_attach/ folder where it can be accessed with a GET request. There are no limitations on files that can be attached, allowing for malicious PHP code to be uploaded and interpreted by the server.
More Stories
mingw-python-jinja2-3.1.5-1.fc40
FEDORA-2025-5f04326f4f Packages in this update: mingw-python-jinja2-3.1.5-1.fc40 Update description: Update to jinja2-3.1.5. Read More
mingw-python-jinja2-3.1.5-1.fc41
FEDORA-2025-dbe19a2b1f Packages in this update: mingw-python-jinja2-3.1.5-1.fc41 Update description: Update to jinja2-3.1.5. Read More
seamonkey-2.53.20-2.el8
FEDORA-EPEL-2025-ef6b6c8d41 Packages in this update: seamonkey-2.53.20-2.el8 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc40
FEDORA-2025-4945eb6eeb Packages in this update: seamonkey-2.53.20-2.fc40 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
seamonkey-2.53.20-2.fc41
FEDORA-2025-135cf1b7f3 Packages in this update: seamonkey-2.53.20-2.fc41 Update description: Fix bookmarks restoring from file. Update to 2.53.20 Read More
USN-7190-1: Tinyproxy vulnerability
It was discovered that Tinyproxy did not properly manage memory during the parsing of HTTP connection headers. An attacker could...