Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBCO-ADMINISTRATOR-ENTERPRISE-EDITION-2021-28827
HistoryApr 15, 2021 - 10:32 p.m.

TIBCO Security Advisory: April 20, 2021 - TIBCO Administrator - Enterprise Edition -2021-28827

2021-04-1522:32:00
Cloud Software Group, Inc.
community.tibco.com
2
tibco
administrator
stored
cross site scripting
vulnerability
cve-2021-28827
unix
exploitable
network access
social engineering
privileged
administrative access
cvss v3
solution
update
version 5.10.3 or higher
version 5.11.2 or higher
tibco silver fabric
z/linux
runtime agent
references
security advisory

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

5.8

Confidence

High

EPSS

0.002

Percentile

59.7%

TIBCO Administrator Stored Cross Site Scripting vulnerability

Original release date: April 20, 2021
Last revised:
CVE-2021-28827
Source: TIBCOSoftware Inc.

Products Affected

TIBCO Administrator - Enterprise Edition versions 5.10.2 and below

TIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1

TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver
Fabric versions 5.10.2 and below

TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver
Fabric versions 5.11.0 and 5.11.1

TIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and
below

TIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and
5.11.1

TIBCO Runtime Agent versions 5.10.2 and below

TIBCO Runtime Agent versions 5.11.0 and 5.11.1

TIBCO Runtime Agent for z/Linux versions 5.10.2 and below

TIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1

The following component is affected:

  • Administration GUI

Description

On unix based systems, the component listed above contains an easily
exploitable vulnerability that allows an unauthenticated attacker to social
engineer a legitimate user with network access to execute a Stored XSS attack
targeting the affected system. A successful attack using this vulnerability
requires human interaction from a person other than the attacker.

Impact

In the worst case, if the victim is a privileged administrator successful
execution of this vulnerability can result in an attacker gaining full
administrative access to the affected system.

CVSS v3 Base Score: 9.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L)

Solution

TIBCO has released updated versions of the affected systems which address this
issue:

TIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to
version 5.10.3 or higher

TIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update
to version 5.11.2 or higher

TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver
Fabric versions 5.10.2 and below update to version 5.10.3 or higher

TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver
Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher

TIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and
below update to version 5.10.3 or higher

TIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and
5.11.1 update to version 5.11.2 or higher

TIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or
higher

TIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or
higher

TIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version
5.10.3 or higher

TIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version
5.11.2 or higher

References

http://www.tibco.com/services/support/advisories
CVE-2021-28827

The information on this page is being provided toyou on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the informationcontained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AREHEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THEINFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement.If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

5.8

Confidence

High

EPSS

0.002

Percentile

59.7%

Related for TIBCO:TIBCO-ADMINISTRATOR-ENTERPRISE-EDITION-2021-28827