var-201802-0679
Vulnerability from variot
IBM Security Guardium Database Activity Monitor 9.0, 9.1, and 9.5 could allow a local user with low privileges to view report pages and perform some actions that only an admin should be performing, so there is risk that someone not authorized can change things that they are not suppose to. IBM X-Force ID: 137765. IBM Security Guardium Database Activity Monitor Contains vulnerabilities related to authorization, permissions, and access control. Vendors have confirmed this vulnerability IBM X-Force ID: 137765 It is released as.Information may be obtained and information may be altered. The product provides features such as compliance automation and protection against internal and external threats. An authorization vulnerability exists in the IBM SecurityGuardiumDatabaseActivityMonitor 9.0, 9.1, and 9.5 releases that caused the program to fail to perform sufficient authorization detection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0679", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "security guardium database activity monitor", "scope": "eq", "trust": 2.4, "vendor": "ibm", "version": "9.0" }, { "model": "security guardium database activity monitor", "scope": "eq", "trust": 2.4, "vendor": "ibm", "version": "9.1" }, { "model": "security guardium database activity monitor", "scope": "eq", "trust": 2.4, "vendor": "ibm", "version": "9.5" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "9.0" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "9.1" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "9.5" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "10.0" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "10.0.1" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "10.1" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "10.1.2" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "10.1.3" }, { "model": "security guardium", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "10.1.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "NVD", "id": "CVE-2018-1368" }, { "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:security_guardium_database_activity_monitor:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:security_guardium_database_activity_monitor:9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ibm:security_guardium_database_activity_monitor:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-1368" } ] }, "cve": "CVE-2018-1368", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-1368", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-03874", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2018-1368", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-1368", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-03874", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201802-342", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-1368", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "VULMON", "id": "CVE-2018-1368" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "NVD", "id": "CVE-2018-1368" }, { "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM Security Guardium Database Activity Monitor 9.0, 9.1, and 9.5 could allow a local user with low privileges to view report pages and perform some actions that only an admin should be performing, so there is risk that someone not authorized can change things that they are not suppose to. IBM X-Force ID: 137765. IBM Security Guardium Database Activity Monitor Contains vulnerabilities related to authorization, permissions, and access control. Vendors have confirmed this vulnerability IBM X-Force ID: 137765 It is released as.Information may be obtained and information may be altered. The product provides features such as compliance automation and protection against internal and external threats. An authorization vulnerability exists in the IBM SecurityGuardiumDatabaseActivityMonitor 9.0, 9.1, and 9.5 releases that caused the program to fail to perform sufficient authorization detection", "sources": [ { "db": "NVD", "id": "CVE-2018-1368" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "VULMON", "id": "CVE-2018-1368" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-1368", "trust": 3.1 }, { "db": "SECTRACK", "id": "1040349", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-001822", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-03874", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201802-342", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-1368", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "VULMON", "id": "CVE-2018-1368" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "NVD", "id": "CVE-2018-1368" }, { "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "id": "VAR-201802-0679", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" } ] }, "last_update_date": "2023-12-18T13:19:15.688000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "2013302", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22013302" }, { "title": "Patch for IBMSecurityGuardiumDatabaseActivityMonitor Authorization Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/119355" }, { "title": "IBM Security Guardium Database Activity Monitor Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78437" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "NVD", "id": "CVE-2018-1368" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/137765" }, { "trust": 1.7, "url": "http://www.ibm.com/support/docview.wss?uid=swg22013302" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1040349" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1368" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1368" }, { "trust": 0.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22013302" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=56767" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "VULMON", "id": "CVE-2018-1368" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "NVD", "id": "CVE-2018-1368" }, { "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-03874" }, { "db": "VULMON", "id": "CVE-2018-1368" }, { "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "db": "NVD", "id": "CVE-2018-1368" }, { "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2018-03874" }, { "date": "2018-02-09T00:00:00", "db": "VULMON", "id": "CVE-2018-1368" }, { "date": "2018-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "date": "2018-02-09T17:29:00.287000", "db": "NVD", "id": "CVE-2018-1368" }, { "date": "2018-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2018-03874" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2018-1368" }, { "date": "2018-03-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001822" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2018-1368" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201802-342" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201802-342" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM Security Guardium Database Activity Monitor Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001822" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201802-342" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.