|
Message-Id: <20141021163449.C2FAFB2E127@smtpvbsrv1.mitre.org> Date: Tue, 21 Oct 2014 12:34:49 -0400 (EDT) From: cve-assign@...re.org To: larry0@...com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Vulnerabilities in WordPress Database Manager v2.7.1 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >>> INSERT into password (passwords) VALUES(LOAD_FILE("/etc/passwd")); >> This report seems related to: >> >> if ( preg_match( "/LOAD_FILE/i", $sql_query ) ) { >> >> in the >> >> https://github.com/lesterchan/wp-dbmanager/commit/7037fa8f61644098044379190d1d4bf1883b8e4a >> one CVE ID now for "attempts to offer a subset of >> MySQL statements without considering the possible MySQL privilege >> configurations" as applied to the LOAD_FILE attack > It seems to me this would be the best approach. I hadn't considered it > originally, but it makes the most sense. Use CVE-2014-8336. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJURoocAAoJEKllVAevmvms8ZcH/1PDEog9U/osvzNql17RlucO 5ZOKgAYHonD/LGaed0Jq8YLjy9kc73umA0Z3qQTdiRYdU06bEGL+FHgB873qHE5F kZwTCknzd993AjhRXlfPN6wMrYibJ8owP6Zi6yakX2g2sNvJL9FLW4x3gUEjAwHX BxttkvCrng+r23X3d/1Ywv0fd1RGlZ0WRsxDKLpW2vLW8KP7IXSq4iOLdLsYFWjq 8CSLS5Md3siIc80HY440s5uHWtImxMS5ZQjA2dCmMywTComtTaLxI1YyuMybdUHp F+Fspm7A+s/NXKBw2pPyhxT1Z6UB7FBT3/j3ll7PbAl5+bhLg7rDxsPRIxsClnQ= =noo2 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.