mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
113 lines
4.5 KiB
JSON
113 lines
4.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "security@tibco.com",
|
|
"DATE_PUBLIC" : "2018-06-12T16:00:00.000Z",
|
|
"ID" : "CVE-2018-5432",
|
|
"STATE" : "PUBLIC",
|
|
"TITLE" : "TIBCO Administrator - Enterprise Edition Cross-Site Scripting Vulnerability"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "TIBCO Administrator - Enterprise Edition",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"affected" : "<=",
|
|
"version_value" : "5.10.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name" : "TIBCO Administrator - Enterprise Edition for z/Linux",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"affected" : "<=",
|
|
"version_value" : "5.9.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "TIBCO Software Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "TIBCO would like to extend its appreciation to Baker Hamilton at Bishop Fox for discovery of this vulnerability."
|
|
}
|
|
],
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The TIBCO Administrator server component of of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, and TIBCO Administrator - Enterprise Edition for z/Linux contains multiple vulnerabilities wherein a malicious user could theoretically perform cross-site scripting (XSS) attacks by way of manipulating artifacts prior to uploading them. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions up to and including 5.10.0, and TIBCO Administrator - Enterprise Edition for z/Linux: versions up to and including 5.9.1."
|
|
}
|
|
]
|
|
},
|
|
"impact" : {
|
|
"cvss" : {
|
|
"attackComplexity" : "LOW",
|
|
"attackVector" : "NETWORK",
|
|
"availabilityImpact" : "HIGH",
|
|
"baseScore" : 8,
|
|
"baseSeverity" : "HIGH",
|
|
"confidentialityImpact" : "HIGH",
|
|
"integrityImpact" : "HIGH",
|
|
"privilegesRequired" : "LOW",
|
|
"scope" : "UNCHANGED",
|
|
"userInteraction" : "REQUIRED",
|
|
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"version" : "3.0"
|
|
}
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The impact of the vulnerability includes the theoretical possibility of a user performing operations using another user's access, including administrative functions being performed by a non-administrative user. The impact also theoretically includes access to all administrative information, including deployment variable settings (\"global variables\")"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://www.tibco.com/support/advisories/2018/06/security-advisory-june-12-2018-tibco-administrator-enterprise-edition-2018-5432",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://www.tibco.com/support/advisories/2018/06/security-advisory-june-12-2018-tibco-administrator-enterprise-edition-2018-5432"
|
|
},
|
|
{
|
|
"name" : "104458",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/104458"
|
|
}
|
|
]
|
|
},
|
|
"solution" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "TIBCO has released updated versions of the affected components which address these issues.\n\nFor each affected system, update to the corresponding software versions:\nTIBCO Administrator - Enterprise Edition versions 5.10.0 and below update to version 5.10.1 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.9.1 and below update to version 5.10.1 or higher\n"
|
|
}
|
|
],
|
|
"source" : {
|
|
"discovery" : "EXTERNAL"
|
|
}
|
|
}
|