2024-12-08 03:06:42 +00:00

193 lines
7.3 KiB
JSON

{
"id": "CVE-2018-12414",
"sourceIdentifier": "security@tibco.com",
"published": "2018-11-06T23:29:00.403",
"lastModified": "2024-11-21T03:45:10.737",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache), and Rendezvous Daemon Manager (rvdm) components of TIBCO Software Inc.'s TIBCO Rendezvous, TIBCO Rendezvous Developer Edition, TIBCO Rendezvous for z/Linux, TIBCO Rendezvous for z/OS, TIBCO Rendezvous Network Server, TIBCO Substation ES contain vulnerabilities which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.'s TIBCO Rendezvous: versions up to and including 8.4.5, TIBCO Rendezvous Developer Edition: versions up to and including 8.4.5, TIBCO Rendezvous for z/Linux: versions up to and including 8.4.5, TIBCO Rendezvous for z/OS: versions up to and including 8.4.5, TIBCO Rendezvous Network Server: versions up to and including 1.1.2, and TIBCO Substation ES: versions up to and including 2.12.2."
},
{
"lang": "es",
"value": "Los componentes Rendezvous Routing Daemon (rvrd), Rendezvous Secure Routing Daemon (rvrsd), Rendezvous Secure Daemon (rvsd), Rendezvous Cache (rvcache) y Rendezvous Daemon Manager (rvdm) de TIBCO Rendezvous, TIBCO Rendezvous Developer Edition, TIBCO Rendezvous for z/Linux, TIBCO Rendezvous for z/OS, TIBCO Rendezvous Network Server y TIBCO Substation ES, de TIBCO Software Inc., contiene vulnerabilidades que podr\u00edan permitir que un atacante realice ataques de Cross-Site Request Forgery (CSRF). Las versiones afectadas son las siguientes: TIBCO Rendezvous: versiones hasta e incluyendo la 8.4.5, TIBCO Rendezvous Developer Edition: versiones hasta e incluyendo la 8.4.5, TIBCO Rendezvous for z/Linux: versiones hasta e incluyendo la 8.4.5, TIBCO Rendezvous for z/OS: versiones hasta e incluyendo la 8.4.5, TIBCO Rendezvous Network Server: versiones hasta e incluyendo la 1.1.2 y TIBCO Substation ES: versiones hasta e incluyendo la 2.12.2."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@tibco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:rendezvous:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.4.5",
"matchCriteriaId": "5BA2A3EA-3046-46B8-8B5B-5729EBBF7E4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:rendezvous:*:*:*:*:developer:*:*:*",
"versionEndIncluding": "8.4.5",
"matchCriteriaId": "E0FC5929-F892-4385-8B8D-6481140D0816"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:rendezvous_for_z\\/linux:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.4.5",
"matchCriteriaId": "8B48475B-178F-4A1B-B368-EE807E888F71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:rendezvous_for_z\\/os:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.4.5",
"matchCriteriaId": "2D3510ED-9E48-480C-BA9E-81E7A30EBF15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:rendezvous_network_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.2",
"matchCriteriaId": "9E7EEDCE-9B08-4598-9341-C834A7AD7564"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:substation_es:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.12.0",
"matchCriteriaId": "6201AB15-011D-412B-953D-A8CEF154FBD6"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/105871",
"source": "security@tibco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-rendezvous",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/105871",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-rendezvous",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}