176 lines
7.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-28829",
"sourceIdentifier": "security@tibco.com",
"published": "2021-04-20T19:15:09.633",
"lastModified": "2021-04-23T21:19:36.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, and TIBCO Administrator - Enterprise Edition for z/Linux contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a persistent CSV injection attack from the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, and TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1."
},
{
"lang": "es",
"value": "El componente GUI de Administraci\u00f3n de TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition para z / Linux y TIBCO Administrator - Enterprise Edition para z/Linux, de TIBCO Software Inc, contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante poco privilegiado con acceso a la red ejecutar un ataque de inyecci\u00f3n CSV persistente desde el sistema afectado. Un ataque con \u00e9xito que utilice esta vulnerabilidad requiere una interacci\u00f3n humana de una persona diferente del atacante. Las versiones afectadas son TIBCO Administrator - Enterprise Edition: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.10.2 y por debajo, y TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.11.0 y 5.11.1, de TIBCO Software Inc"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@tibco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:*:*:*",
"versionEndIncluding": "5.10.2",
"matchCriteriaId": "CCCCD52B-6905-41BD-83D9-A4B800E76BAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:silver_fabric:*:*",
"versionEndIncluding": "5.10.2",
"matchCriteriaId": "CF92E468-2FFA-4F3E-BC61-CFFC059627D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:z\\/linux:*:*",
"versionEndIncluding": "5.10.2",
"matchCriteriaId": "DA9D9C2C-1FCE-45E1-AB7A-9586C25A8969"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "C9291FEA-0386-42EF-94A6-20E599171D4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:silver_fabric:*:*",
"matchCriteriaId": "EF42B5B6-2CCD-4124-8DAB-252912F413A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:z\\/linux:*:*",
"matchCriteriaId": "A9D79741-41D8-44E7-9CD7-D3DEFE98CF57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "CE3C501F-2CEB-4300-9430-E2AB43009E74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:silver_fabric:*:*",
"matchCriteriaId": "CC01905D-D082-4EDF-BF82-FB69ED80664A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:z\\/linux:*:*",
"matchCriteriaId": "CC640410-CCFC-4B10-AF30-157F60ABF751"
}
]
}
]
}
],
"references": [
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28829",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
}
]
}