Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile.
References
Configurations
Information
Published : 2005-12-30 21:00
Updated : 2017-07-28 18:29
NVD link : CVE-2005-4871
Mitre link : CVE-2005-4871
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
ibm
- db2