CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
50.0%
Original release date: February 13,2019
Last revised:
CVE-2018-12409
Source: TIBCO Software Inc.
TIBCO Silver Fabric Vulnerable to Reflected Cross-Site Scripting attacks
Original release date: February 13, 2019
Last revised: –
Source: TIBCO Software Inc.
Systems Affected
TIBCO Silver Fabric versions 5.8.1 and below
The following component is affected:
Description
The component listed above contains a vulnerability that may allow reflected
cross-site scripting (XSS) attacks.
Impact
The impact of this vulnerability includes the theoretical possibility that
an unauthenticated attacker could perform administrative functions provided
by the web interface of the affected system.
CVSS v3 Base Score: 8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Solution
TIBCO has released updated versions of the affected component which address
this issue.
For each affected system, update to the corresponding software versions:
TIBCO Silver Fabric versions 5.8.1 and below update to version 6.0.0
or higher
Note that the affected component has been deprecated in the systems affected.
For customers that might not be able to update the software as quickly as
needed, an alternate remediation is to disable the affected component. The
component can be disabled by removing the configuration lines that activate
it.
To disable the affected component:
- find the file $SF_HOME/webapps/livecluster/WEB-INF/web.xml (where
$SF_HOME corresponds to the root folder where TIBCO Silver Fabric is
installed.)
- open the file in a text editor, and remove the lines that look like this:
AxisServlet
/webservices/*
AxisServlet
/WebServices/*
Acknowledgments
TIBCO would like to extend its appreciation to Robert Podsiadlo of ING Tech
Poland for discovery of this vulnerability.
References
http://www.tibco.com/services/support/advisories
CVE-2018-12409
The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
50.0%