2024-12-08 03:06:42 +00:00

238 lines
8.8 KiB
JSON

{
"id": "CVE-2018-18815",
"sourceIdentifier": "security@tibco.com",
"published": "2019-03-07T22:29:00.383",
"lastModified": "2024-11-21T03:56:40.430",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The REST API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability that theoretically allows unauthenticated users to bypass authorization checks for portions of the HTTP interface to the JasperReports Server. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0."
},
{
"lang": "es",
"value": "El componente REST API de TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy y TIBCO Jaspersoft Reporting and Analytics for AWS, de TIBCO Software Inc., contiene una vulnerabilidad que, te\u00f3ricamente, permite a los usuarios no autenticados omitir las comprobaciones de autorizaci\u00f3n para segmentos de la interfaz HTTP en el servidor de JasperReports. Las distribuciones afectadas de TIBCO JasperReports Server de TIBCO Software Inc. son las siguientes: 6.4.0, 6.4.1, 6.4.3 y 7.1.0; TIBCO JasperReports Server Community Edition: versiones hasta e incluyendo la 7.1.0; TIBCO JasperReports Server for ActiveMatrix BPM: versiones hasta e incluyendo la 6.4.3; TIBCO Jaspersoft for AWS with Multi-Tenancy: versiones hasta e incluyendo la 7.1.0; TIBCO Jaspersoft Reporting and Analytics for AWS: versiones hasta e incluyendo la 7.1.0, de TIBCO Software Inc."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@tibco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"versionEndIncluding": "6.4.3",
"matchCriteriaId": "2F0C3B25-3D6F-44AD-A7FC-20EEB27F5C99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"versionEndIncluding": "7.1.0",
"matchCriteriaId": "090526EA-24A0-4E6A-82CD-29FC4ADAA397"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B714B874-89AD-49AD-8B8D-2EEDF6804E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DAECE73B-DFCC-4C5E-8817-9783A477649A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7A9802-61F8-45AC-B5C5-82521DF50B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E990A0DE-874E-48DA-8A57-51DE79122A9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jasperreports_server:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67CFE53D-7FB0-47AD-BE1B-107B9F9DDC5B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"versionEndIncluding": "7.1.0",
"matchCriteriaId": "CFE831B3-9810-4C6C-B443-03CE07B316C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*",
"versionEndIncluding": "7.1.0",
"matchCriteriaId": "B80CC0CC-05E6-43C6-9A05-4EDCB9046BB9"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/107346",
"source": "security@tibco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-server-2018-18815",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-305/",
"source": "security@tibco.com"
},
{
"url": "http://www.securityfocus.com/bid/107346",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.tibco.com/services/support/advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-server-2018-18815",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-305/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}