oss-sec mailing list archives

Re: Vulnerabilities in WordPress Database Manager v2.7.1


From: cve-assign () mitre org
Date: Tue, 21 Oct 2014 12:34:49 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

INSERT into password (passwords) VALUES(LOAD_FILE("/etc/passwd"));

This report seems related to:

  if ( preg_match( "/LOAD_FILE/i", $sql_query ) ) {

in the

  https://github.com/lesterchan/wp-dbmanager/commit/7037fa8f61644098044379190d1d4bf1883b8e4a
 
one CVE ID now for "attempts to offer a subset of
MySQL statements without considering the possible MySQL privilege
configurations" as applied to the LOAD_FILE attack

It seems to me this would be the best approach. I hadn't considered it
originally, but it makes the most sense.

Use CVE-2014-8336.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJURoocAAoJEKllVAevmvms8ZcH/1PDEog9U/osvzNql17RlucO
5ZOKgAYHonD/LGaed0Jq8YLjy9kc73umA0Z3qQTdiRYdU06bEGL+FHgB873qHE5F
kZwTCknzd993AjhRXlfPN6wMrYibJ8owP6Zi6yakX2g2sNvJL9FLW4x3gUEjAwHX
BxttkvCrng+r23X3d/1Ywv0fd1RGlZ0WRsxDKLpW2vLW8KP7IXSq4iOLdLsYFWjq
8CSLS5Md3siIc80HY440s5uHWtImxMS5ZQjA2dCmMywTComtTaLxI1YyuMybdUHp
F+Fspm7A+s/NXKBw2pPyhxT1Z6UB7FBT3/j3ll7PbAl5+bhLg7rDxsPRIxsClnQ=
=noo2
-----END PGP SIGNATURE-----


Current thread: