CVE-2023-42005 (GCVE-0-2023-42005)
Vulnerability from cvelistv5 – Published: 2024-05-29 12:53 – Updated: 2024-08-02 19:16
VLAI?
Title
IBM Db2 on Cloud Pak for Data privilege escalation
Summary
IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.
Severity ?
7.4 (High)
CWE
- CWE-264 - Permissions, Privileges, Access Controls
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | Db2 on Cloud Pak for Data |
Affected:
3.5, 4.0, 4.5, 4.6, 4.7, 4.8
cpe:2.3:a:ibm:db2:3.5:refresh_10:*:*:*:*:*:* cpe:2.3:a:ibm:db2:4.0:refresh_9:*:*:*:*:*:* cpe:2.3:a:ibm:db2:4.5:refresh_3:*:*:*:*:*:* cpe:2.3:a:ibm:db2:4.6:refresh_6:*:*:*:*:*:* cpe:2.3:a:ibm:db2:4.7:refresh_4:*:*:*:*:*:* cpe:2.3:a:ibm:db2:4.8:refresh_4:*:*:*:*:*:* cpe:2.3:a:ibm:db2_warehouse:3.5:refresh_10:*:*:*:*:*:* cpe:2.3:a:ibm:db2_warehouse:4.0:refresh_9:*:*:*:*:*:* cpe:2.3:a:ibm:db2_warehouse:4.5:refresh_3:*:*:*:*:*:* cpe:2.3:a:ibm:db2_warehouse:4.6:refresh_6:*:*:*:*:*:* cpe:2.3:a:ibm:db2_warehouse:4.7:refresh_4:*:*:*:*:*:* cpe:2.3:a:ibm:db2_warehouse:4.8:refresh_4:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42005",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-29T15:31:04.424637Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:25:23.462Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:49.464Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.ibm.com/support/pages/node/7155078"
},
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265264"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2:3.5:refresh_10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:4.0:refresh_9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:4.5:refresh_3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:4.6:refresh_6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:4.7:refresh_4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:4.8:refresh_4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse:3.5:refresh_10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse:4.0:refresh_9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse:4.5:refresh_3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse:4.6:refresh_6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse:4.7:refresh_4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_warehouse:4.8:refresh_4:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "Db2 on Cloud Pak for Data",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "3.5, 4.0, 4.5, 4.6, 4.7, 4.8"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.\u003c/span\u003e\n\n"
}
],
"value": "IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-264",
"description": "CWE-264 Permissions, Privileges, Access Controls",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-29T12:53:04.315Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.ibm.com/support/pages/node/7155078"
},
{
"tags": [
"vdb-entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265264"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM Db2 on Cloud Pak for Data privilege escalation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2023-42005",
"datePublished": "2024-05-29T12:53:04.315Z",
"dateReserved": "2023-09-06T19:32:50.696Z",
"dateUpdated": "2024-08-02T19:16:49.464Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.\"}, {\"lang\": \"es\", \"value\": \"IBM Db2 on Cloud Pak for Data y Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7 y 4.8 podr\\u00edan permitir a un usuario con acceso al pod de Kubernetes realizar llamadas al sistema que comprometan la seguridad de los contenedores. ID de IBM X-Force: 265264.\"}]",
"id": "CVE-2023-42005",
"lastModified": "2024-11-21T08:22:05.557",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@us.ibm.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.4, \"impactScore\": 5.9}]}",
"published": "2024-05-29T13:15:48.710",
"references": "[{\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/265264\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"https://www.ibm.com/support/pages/node/7155078\", \"source\": \"psirt@us.ibm.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/265264\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.ibm.com/support/pages/node/7155078\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"psirt@us.ibm.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-42005\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2024-05-29T13:15:48.710\",\"lastModified\":\"2025-08-18T15:03:51.540\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.\"},{\"lang\":\"es\",\"value\":\"IBM Db2 on Cloud Pak for Data y Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7 y 4.8 podr\u00edan permitir a un usuario con acceso al pod de Kubernetes realizar llamadas al sistema que comprometan la seguridad de los contenedores. ID de IBM X-Force: 265264.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.4,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:3.5:-:*:*:-:*:*:*\",\"matchCriteriaId\":\"0747E2F0-BF57-419A-8D3E-FACBB1429A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:3.5:refresh_10:*:*:-:*:*:*\",\"matchCriteriaId\":\"15C6480A-8BA6-45BE-B605-B0AD1D5B1806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.0:-:*:*:-:*:*:*\",\"matchCriteriaId\":\"07104A7F-4A21-4F2D-A209-127E257C7A60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.0:refresh_9:*:*:-:*:*:*\",\"matchCriteriaId\":\"392FE848-F249-4146-A4D4-F15B1C8F1CD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.5:-:*:*:-:*:*:*\",\"matchCriteriaId\":\"2D68EC34-E985-4DB8-8DD3-D6C18F8CD27D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.5:refresh_3:*:*:-:*:*:*\",\"matchCriteriaId\":\"A3C199D4-02EC-4C62-9228-87F1ECA329F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.6:-:*:*:-:*:*:*\",\"matchCriteriaId\":\"C21D8199-AE3A-4305-B44C-5A687D871D9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.6:refresh_6:*:*:-:*:*:*\",\"matchCriteriaId\":\"BF7D6CD1-1B99-4BC5-A8DA-65C089879CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.7:-:*:*:-:*:*:*\",\"matchCriteriaId\":\"7187E3C2-90F2-4C61-B486-D0F7B0BB2594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.7:refresh_4:*:*:-:*:*:*\",\"matchCriteriaId\":\"922DCF7C-68B8-49FD-A838-3A3DE922BE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.8:-:*:*:-:*:*:*\",\"matchCriteriaId\":\"34F0463B-327F-43C6-B9BD-6DA3D734F0C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2:4.8:refresh_4:*:*:-:*:*:*\",\"matchCriteriaId\":\"C13AB42E-0A44-4FFE-BE1C-DF91BE0FFA1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:3.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC9BE0B-76A7-41BF-BE22-7F8C167DF243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:3.5:refresh_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C0972A-C0A7-4497-AE6F-D5F266F1DBF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE87E729-F00A-43F8-91FF-BAA8B4B3986C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.0:refresh_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"353A9E03-50CD-46E0-A5AB-351AA426007F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2CBB056-CC8A-4A34-AA3C-CDC7D8DE2426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.5:refresh_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D823704-6F82-47BE-8658-466ECD051451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C71080-1C6B-4D8C-BA79-DED384A42290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.6:refresh_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0618E3-0AD6-48C9-B047-809554FDDD97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CBDB0AB-1F70-4B36-AE9F-B48DB7B96070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.7:refresh_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"773DD7AA-2771-412F-AE79-E37B3E8FCBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D671B7-E8C1-4A50-BDDA-F9F511841EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:db2_warehouse:4.8:refresh_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F30B3E8-0256-4305-ABF9-9398303D96F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:ibm:cloud_pak_for_data:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF8080B-A664-47DE-A637-965725C7E8BF\"}]}]}],\"references\":[{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/265264\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/7155078\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/265264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.ibm.com/support/pages/node/7155078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7155078\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/265264\", \"tags\": [\"vdb-entry\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:16:49.464Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-42005\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-29T15:31:04.424637Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-29T15:33:24.524Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"IBM Db2 on Cloud Pak for Data privilege escalation\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:db2:3.5:refresh_10:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2:4.0:refresh_9:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2:4.5:refresh_3:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2:4.6:refresh_6:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2:4.7:refresh_4:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2:4.8:refresh_4:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2_warehouse:3.5:refresh_10:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2_warehouse:4.0:refresh_9:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2_warehouse:4.5:refresh_3:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2_warehouse:4.6:refresh_6:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2_warehouse:4.7:refresh_4:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:db2_warehouse:4.8:refresh_4:*:*:*:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"Db2 on Cloud Pak for Data\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.5, 4.0, 4.5, 4.6, 4.7, 4.8\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7155078\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/265264\", \"tags\": [\"vdb-entry\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eIBM Db2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data 3.5, 4.0, 4.5, 4.6, 4.7, and 4.8 could allow a user with access to the Kubernetes pod, to make system calls compromising the security of containers. IBM X-Force ID: 265264.\u003c/span\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-264\", \"description\": \"CWE-264 Permissions, Privileges, Access Controls\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2024-05-29T12:53:04.315Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-42005\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T19:16:49.464Z\", \"dateReserved\": \"2023-09-06T19:32:50.696Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2024-05-29T12:53:04.315Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…