mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
169 lines
9.1 KiB
JSON
169 lines
9.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@tibco.com",
|
|
"DATE_PUBLIC": "2020-10-20T17:00:00Z",
|
|
"ID": "CVE-2020-9417",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "TIBCO Foresight SQL Injection"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "TIBCO Foresight Archive and Retrieval System",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_value": "5.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.2.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "TIBCO Foresight Archive and Retrieval System Healthcare Edition",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_value": "5.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.2.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "TIBCO Foresight Operational Monitor",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_value": "5.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.2.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "TIBCO Foresight Operational Monitor Healthcare Edition",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_value": "5.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.2.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "TIBCO Foresight Transaction Insight",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_value": "5.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.2.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "TIBCO Foresight Transaction Insight Healthcare Edition",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_value": "5.1.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.2.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "TIBCO Software Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Transaction Insight reporting component of TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction Insight, and TIBCO Foresight Transaction Insight Healthcare Edition contains a vulnerability that theoretically allows an authenticated attacker to perform SQL injection. Affected releases are TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Archive and Retrieval System Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Transaction Insight: versions 5.1.0 and below, version 5.2.0, and TIBCO Foresight Transaction Insight Healthcare Edition: versions 5.1.0 and below, version 5.2.0."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 7.6,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The impact of these vulnerabilities includes the theoretical possibility that an authenticated attacker could craft a SQL query that would allow the attacker to create records, and read, update or delete entries in a victim\u2019s account."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.tibco.com/services/support/advisories",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.tibco.com/services/support/advisories"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Foresight Archive and Retrieval System versions 5.1.0 and below update to version 5.1.1 or higher\nTIBCO Foresight Archive and Retrieval System version 5.2.0 update to version 5.2.1 or higher\nTIBCO Foresight Archive and Retrieval System Healthcare Edition versions 5.1.0 and below update to version 5.1.1 or higher\nTIBCO Foresight Archive and Retrieval System Healthcare Edition version 5.2.0 update to version 5.2.1 or higher\nTIBCO Foresight Operational Monitor versions 5.1.0 and below update to version 5.1.1 or higher\nTIBCO Foresight Operational Monitor version 5.2.0 update to version 5.2.1 or higher\nTIBCO Foresight Operational Monitor Healthcare Edition versions 5.1.0 and below update to version 5.1.1 or higher\nTIBCO Foresight Operational Monitor Healthcare Edition version 5.2.0 update to version 5.2.1 or higher\nTIBCO Foresight Transaction Insight versions 5.1.0 and below update to version 5.1.1 or higher\nTIBCO Foresight Transaction Insight version 5.2.0 update to version 5.2.1 or higher\nTIBCO Foresight Transaction Insight Healthcare Edition versions 5.1.0 and below update to version 5.1.1 or higher\nTIBCO Foresight Transaction Insight Healthcare Edition version 5.2.0 update to version 5.2.1 or higher"
|
|
}
|
|
],
|
|
"source": {
|
|
"discovery": "INTERNAL"
|
|
}
|
|
} |