René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

206 lines
6.9 KiB
JSON

{
"id": "CVE-2017-5528",
"sourceIdentifier": "security@tibco.com",
"published": "2017-06-29T14:29:00.180",
"lastModified": "2021-09-09T12:41:58.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple JasperReports Server components contain vulnerabilities which may allow authorized users to perform cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. The impact of this vulnerability includes the theoretical disclosure of sensitive information. Affects TIBCO JasperReports Server (versions 6.1.1 and below, 6.2.0, 6.2.1, and 6.3.0), TIBCO JasperReports Server Community Edition (versions 6.3.0 and below), TIBCO JasperReports Server for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO Jaspersoft for AWS with Multi-Tenancy (versions 6.2.0 and below), and TIBCO Jaspersoft Reporting and Analytics for AWS (versions 6.2.0 and below)."
},
{
"lang": "es",
"value": "M\u00faltiples componentes JasperReports Server contienen vulnerabilidades que podr\u00edan permitir que usuarios autorizados realicen ataques de Cross-Site Scripting (XSS) y Cross-Site Request Forgery (CSRF). El impacto de esta vulnerabilidad incluye la revelaci\u00f3n te\u00f3rica de informaci\u00f3n sensible. Afecta a TIBCO JasperReports Server (versiones 6.1.1 y anteriores, 6.2.0, 6.2.1 y 6.3.0), TIBCO JasperReports Server Community Edition (versiones 6.3.0 y anteriores), TIBCO JasperReports Server for ActiveMatrix BPM (versiones 6.2.0 y anteriores), TIBCO Jaspersoft for AWS with Multi-Tenancy (versiones 6.2.0 y anteriores) y TIBCO Jaspersoft Reporting and Analytics for AWS (versiones 6.2.0 y anteriores)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@tibco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.1.1",
"matchCriteriaId": "EB779293-3B1E-4EFA-9949-194F50DF7829"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.2.0:*:*:*:-:-:*:*",
"matchCriteriaId": "992BFF82-BB2B-4208-B3AA-6C93F9154722"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.2.1:*:*:*:-:-:*:*",
"matchCriteriaId": "672D50A6-5A35-494B-B6E0-C52E64DED77E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.0:*:*:*:-:-:*:*",
"matchCriteriaId": "AF03FFD8-AD8E-4F8E-8D5D-0675850E87B9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"versionEndIncluding": "6.3.0",
"matchCriteriaId": "53588A16-9E0B-4B9D-80C6-E73406404F96"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"versionEndIncluding": "6.2.0",
"matchCriteriaId": "196B8920-FCBC-401E-A09C-1023A7B29319"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"versionEndIncluding": "6.2.0",
"matchCriteriaId": "FC9BE526-F462-46F7-A67A-8C46E5E7FBC5"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*",
"versionEndIncluding": "6.2.0",
"matchCriteriaId": "C3E68AF5-ED4C-4FEE-9B60-593033371DBB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
}
]
}