2023-11-07 21:03:21 +00:00

131 lines
4.8 KiB
JSON

{
"id": "CVE-2020-9414",
"sourceIdentifier": "security@tibco.com",
"published": "2020-06-30T20:15:13.470",
"lastModified": "2023-11-07T03:26:53.050",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The MFT admin service component of TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center and TIBCO Managed File Transfer Internet Server contains a vulnerability that theoretically allows an authenticated user with specific permissions to obtain the session identifier of another user. The session identifier when replayed could provide administrative rights or file transfer permissions to the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center: versions 8.2.1 and below and TIBCO Managed File Transfer Internet Server: versions 8.2.1 and below."
},
{
"lang": "es",
"value": "El componente del servicio de administraci\u00f3n MFT del TIBCO Managed File Transfer Command Center y TIBCO Managed File Transfer Internet Server de TIBCO Software Inc, contiene una vulnerabilidad que te\u00f3ricamente permite a un usuario autenticado con permisos espec\u00edficos obtener el identificador de sesi\u00f3n de otro usuario. El identificador de sesi\u00f3n cuando se reproduce podr\u00eda proporcionar derechos administrativos o permisos de transferencia de archivos al sistema afectado. Las versiones afectadas son TIBCO Managed File Transfer Command Center: versiones 8.2.1 y por debajo y TIBCO Managed File Transfer Internet Server: versiones 8.2.1 y por debajo, de TIBCO Software Inc"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:managed_file_transfer_command_center:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.1",
"matchCriteriaId": "FE39BD76-859E-4CFC-97CD-7505BF0B7BFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:managed_file_transfer_internet_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.1",
"matchCriteriaId": "E380AF76-D71F-4D37-B0A9-BA4EC96F7D06"
}
]
}
]
}
],
"references": [
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
}
]
}