Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 21 Oct 2014 12:34:49 -0400 (EDT)
From: cve-assign@...re.org
To: larry0@...com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Vulnerabilities in WordPress Database Manager v2.7.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>>> INSERT into password (passwords) VALUES(LOAD_FILE("/etc/passwd"));

>> This report seems related to:
>> 
>>   if ( preg_match( "/LOAD_FILE/i", $sql_query ) ) {
>> 
>> in the
>> 
>>   https://github.com/lesterchan/wp-dbmanager/commit/7037fa8f61644098044379190d1d4bf1883b8e4a
 
>> one CVE ID now for "attempts to offer a subset of
>> MySQL statements without considering the possible MySQL privilege
>> configurations" as applied to the LOAD_FILE attack

> It seems to me this would be the best approach. I hadn't considered it
> originally, but it makes the most sense.

Use CVE-2014-8336.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJURoocAAoJEKllVAevmvms8ZcH/1PDEog9U/osvzNql17RlucO
5ZOKgAYHonD/LGaed0Jq8YLjy9kc73umA0Z3qQTdiRYdU06bEGL+FHgB873qHE5F
kZwTCknzd993AjhRXlfPN6wMrYibJ8owP6Zi6yakX2g2sNvJL9FLW4x3gUEjAwHX
BxttkvCrng+r23X3d/1Ywv0fd1RGlZ0WRsxDKLpW2vLW8KP7IXSq4iOLdLsYFWjq
8CSLS5Md3siIc80HY440s5uHWtImxMS5ZQjA2dCmMywTComtTaLxI1YyuMybdUHp
F+Fspm7A+s/NXKBw2pPyhxT1Z6UB7FBT3/j3ll7PbAl5+bhLg7rDxsPRIxsClnQ=
=noo2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ