{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2014-8336", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The \"Sql Run Query\" panel in WP-DBManager (aka Database Manager) plugin before 2.7.2 for WordPress allows remote attackers to read arbitrary files by leveraging failure to sufficiently limit queries, as demonstrated by use of LOAD_FILE in an INSERT statement." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20141021 Re: Vulnerabilities in WordPress Database Manager v2.7.1", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2014/10/21/3" }, { "name" : "http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html", "refsource" : "MISC", "url" : "http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html" }, { "name" : "https://github.com/lesterchan/wp-dbmanager/commit/7037fa8f61644098044379190d1d4bf1883b8e4a", "refsource" : "CONFIRM", "url" : "https://github.com/lesterchan/wp-dbmanager/commit/7037fa8f61644098044379190d1d4bf1883b8e4a" }, { "name" : "https://wordpress.org/plugins/wp-dbmanager/#developers", "refsource" : "CONFIRM", "url" : "https://wordpress.org/plugins/wp-dbmanager/#developers" }, { "name" : "dbmgr-wordpress-cve20148336-file-download(97694)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/97694" } ] } }