ChurchInfo contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker provides malformed input to the 'GroupID' variable in the ClassAttendance.php script, which will disclose the software's installation path resulting in a loss of confidentiality. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.
Remote / Network Access
Loss of Confidentiality
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: turn the debug option off.
In versions prior to 1.2.3 the debug option is set in Include/Config.php. In version 1.2.3 and above the debug option is set by selecting Admin -> Edit General Settings.