mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
109 lines
4.8 KiB
JSON
109 lines
4.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@tibco.com",
|
|
"DATE_PUBLIC": "2017-12-12T17:00:00.000Z",
|
|
"ID": "CVE-2017-5534",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Improper sandboxing of a third-party component in tibbr"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "tibbr Community",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "5.2.1 and below"
|
|
},
|
|
{
|
|
"version_value": "6.0.0"
|
|
},
|
|
{
|
|
"version_value": "6.0.1"
|
|
},
|
|
{
|
|
"version_value": "7.0.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tibbr Enterprise",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "5.2.1 and below"
|
|
},
|
|
{
|
|
"version_value": "6.0.0"
|
|
},
|
|
{
|
|
"version_value": "6.0.1"
|
|
},
|
|
{
|
|
"version_value": "7.0.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "TIBCO Software Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The tibbr user profiles components of tibbr Community, and tibbr Enterprise expose a weakness in an improperly sandboxed third-party component. Affected releases are TIBCO Software Inc. tibbr Community 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0, tibbr Enterprise 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The impact of this vulnerability includes the ability to execute arbitrary code with the privileges of the user that invoked the tibbr server."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.tibco.com/support/advisories/2017/12/tibco-security-advisory-december-12-2017-tibbr-2017-5534",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.tibco.com/support/advisories/2017/12/tibco-security-advisory-december-12-2017-tibbr-2017-5534"
|
|
}
|
|
]
|
|
},
|
|
"solution": "TIBCO has released updated versions of the affected components which address these issues.\n\nFor each affected system, update to the corresponding software versions:\n\nFor tibbr Community\n versions 5.2.1 and below, upgrade to version 5.2.2 or higher\n versions 6.0.X, upgrade to version 6.0.2 or higher\n version 7.0.0, upgrade to version 7.0.1 or higher\n\nFor tibbr Enterprise\n versions 5.2.1 and below, upgrade to version 5.2.2 or higher\n versions 6.0.X, upgrade to version 6.0.2 or higher\n version 7.0.0, upgrade to version 7.0.1 or higher\n"
|
|
} |