{ "schema_version": "1.4.0", "id": "GHSA-r3rc-xgjr-hc9q", "modified": "2025-04-20T03:44:15Z", "published": "2022-05-17T01:16:57Z", "aliases": [ "CVE-2014-8677" ], "details": "The installation process for SOPlanning 1.32 and earlier allows remote authenticated users with a prepared database, and access to an existing database with a crafted name, or permissions to create arbitrary databases, or if PHP before 5.2 is being used, the configuration database is down, and smarty/templates_c is not writable to execute arbitrary php code via a crafted database name.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8677" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/37604" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2015/Jul/44" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75726" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-08-31T22:29:00Z" } }