"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-04-20 19:00:42 +00:00
parent 9bd796d6c9
commit eb63ccb7a7
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
8 changed files with 600 additions and 526 deletions

View File

@ -81,6 +81,16 @@
"refsource": "MLIST",
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[kafka-dev] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka",
"url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[kafka-jira] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka",
"url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E"
}
]
}

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://medium.com/@th3cyb3rc0p/cve-2020-24115-use-of-hardcoded-credentials-in-source-code-leads-to-admin-panel-access-77e5028ec9af",
"url": "https://medium.com/@th3cyb3rc0p/cve-2020-24115-use-of-hardcoded-credentials-in-source-code-leads-to-admin-panel-access-77e5028ec9af"
},
{
"refsource": "MISC",
"name": "https://systemweakness.com/cve-2020-24115-use-of-hardcoded-credentials-in-source-code-leads-to-admin-panel-access-77e5028ec9af",
"url": "https://systemweakness.com/cve-2020-24115-use-of-hardcoded-credentials-in-source-code-leads-to-admin-panel-access-77e5028ec9af"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://th3cyb3rc0p.medium.com/cve-2020-24723-89ea76588286",
"url": "https://th3cyb3rc0p.medium.com/cve-2020-24723-89ea76588286"
},
{
"refsource": "MISC",
"name": "https://systemweakness.com/cve-2020-24723-89ea76588286",
"url": "https://systemweakness.com/cve-2020-24723-89ea76588286"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://th3cyb3rc0p.medium.com/cve-2020-25952-f60fff8ffac",
"url": "https://th3cyb3rc0p.medium.com/cve-2020-25952-f60fff8ffac"
},
{
"refsource": "MISC",
"name": "https://systemweakness.com/cve-2020-25952-f60fff8ffac",
"url": "https://systemweakness.com/cve-2020-25952-f60fff8ffac"
}
]
}

View File

@ -1,209 +1,209 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2021-04-20T17:00:00Z",
"ID": "CVE-2021-28827",
"STATE": "PUBLIC",
"TITLE": "TIBCO Administrator Stored Cross Site Scripting vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1.\n"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "In the worst case, if the victim is a privileged administrator successful execution of this vulnerability can result in an attacker gaining full administrative access to the affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
}
],
"source": {
"discovery": "USER"
}
}
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2021-04-20T17:00:00Z",
"ID": "CVE-2021-28827",
"STATE": "PUBLIC",
"TITLE": "TIBCO Administrator Stored Cross Site Scripting vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Runtime Agent for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "In the worst case, if the victim is a privileged administrator successful execution of this vulnerability can result in an attacker gaining full administrative access to the affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
}
],
"source": {
"discovery": "USER"
}
}

View File

@ -1,157 +1,157 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2021-04-20T17:00:00Z",
"ID": "CVE-2021-28828",
"STATE": "PUBLIC",
"TITLE": "TIBCO Administrator SQL injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, and TIBCO Administrator - Enterprise Edition for z/Linux contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a SQL injection attack on the affected system.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, and TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1.\n"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Successful execution of this vulnerability may result in unauthorized read, update, insert or delete access to TIBCO Administrator data on the affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
}
],
"source": {
"discovery": "USER"
}
}
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2021-04-20T17:00:00Z",
"ID": "CVE-2021-28828",
"STATE": "PUBLIC",
"TITLE": "TIBCO Administrator SQL injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, and TIBCO Administrator - Enterprise Edition for z/Linux contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a SQL injection attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, and TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Successful execution of this vulnerability may result in unauthorized read, update, insert or delete access to TIBCO Administrator data on the affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
}
],
"source": {
"discovery": "USER"
}
}

View File

@ -1,157 +1,157 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2021-04-20T17:00:00Z",
"ID": "CVE-2021-28829",
"STATE": "PUBLIC",
"TITLE": "TIBCO Administrator CSV injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, and TIBCO Administrator - Enterprise Edition for z/Linux contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a persistent CSV injection attack from the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, and TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1.\n"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Successful execution of this vulnerability provides the attacker with the ability to exploit the inherent trust an end-user has in the affected system and may allow an attacker to:- Infect end users with viruses or malware- Gain control over an end-user's computer and execute operating system commands- Steal sensitive information- Forge, spoof or modify data that appears to be generated by the affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
}
],
"source": {
"discovery": "USER"
}
}
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2021-04-20T17:00:00Z",
"ID": "CVE-2021-28829",
"STATE": "PUBLIC",
"TITLE": "TIBCO Administrator CSV injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_value": "5.10.2"
}
]
}
},
{
"product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.11.0"
},
{
"version_affected": "=",
"version_value": "5.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, and TIBCO Administrator - Enterprise Edition for z/Linux contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a persistent CSV injection attack from the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, and TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Successful execution of this vulnerability provides the attacker with the ability to exploit the inherent trust an end-user has in the affected system and may allow an attacker to:- Infect end users with viruses or malware- Gain control over an end-user's computer and execute operating system commands- Steal sensitive information- Forge, spoof or modify data that appears to be generated by the affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "eng",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
}
],
"source": {
"discovery": "USER"
}
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-30464",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2021-30464",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "OMICRON StationGuard before 1.10 allows remote attackers to cause a denial of service (connectivity outage) via crafted tcp/20499 packets to the CTRL Ethernet port."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.omicronenergy.com/en/support/product-security/",
"refsource": "MISC",
"name": "https://www.omicronenergy.com/en/support/product-security/"
},
{
"refsource": "CONFIRM",
"name": "https://www.omicronenergy.com/download/file/e81f23250097e7d5e1071dfbdb7f16d2/",
"url": "https://www.omicronenergy.com/download/file/e81f23250097e7d5e1071dfbdb7f16d2/"
}
]
}