[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: Vulnerabilities in WordPress Database Manager v2.7.1
From:       cve-assign () mitre ! org
Date:       2014-10-21 16:34:49
Message-ID: 20141021163449.C2FAFB2E127 () smtpvbsrv1 ! mitre ! org
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>>> INSERT into password (passwords) VALUES(LOAD_FILE("/etc/passwd"));

>> This report seems related to:
>> 
>>   if ( preg_match( "/LOAD_FILE/i", $sql_query ) ) {
>> 
>> in the
>> 
>>   https://github.com/lesterchan/wp-dbmanager/commit/7037fa8f61644098044379190d1d4bf1883b8e4a
 
>> one CVE ID now for "attempts to offer a subset of
>> MySQL statements without considering the possible MySQL privilege
>> configurations" as applied to the LOAD_FILE attack

> It seems to me this would be the best approach. I hadn't considered it
> originally, but it makes the most sense.

Use CVE-2014-8336.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJURoocAAoJEKllVAevmvms8ZcH/1PDEog9U/osvzNql17RlucO
5ZOKgAYHonD/LGaed0Jq8YLjy9kc73umA0Z3qQTdiRYdU06bEGL+FHgB873qHE5F
kZwTCknzd993AjhRXlfPN6wMrYibJ8owP6Zi6yakX2g2sNvJL9FLW4x3gUEjAwHX
BxttkvCrng+r23X3d/1Ywv0fd1RGlZ0WRsxDKLpW2vLW8KP7IXSq4iOLdLsYFWjq
8CSLS5Md3siIc80HY440s5uHWtImxMS5ZQjA2dCmMywTComtTaLxI1YyuMybdUHp
F+Fspm7A+s/NXKBw2pPyhxT1Z6UB7FBT3/j3ll7PbAl5+bhLg7rDxsPRIxsClnQ=
=noo2
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic