Original release date:February 22, 2023
Last revised: —
CVE-2022-41566
Source: TIBCO Software Inc.
Products Affected
TIBCO EBX Add-ons versions 5.6.0 and below
The following component is affected:
Description
The component listed above contains an easily exploitable vulnerability that
allows a low privileged attacker with network access to execute stored XSS on
the affected system.
Impact
The impact of this vulnerability includes the theoretical possibility of
unauthorized access to TIBCO EBX® Add-ons data. This includes the ability to
update, insert, or delete data.
CVSS v3.1 Base Score: 8.7 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)
Solution
TIBCO has released updated versions of the affected systems which address this
issue:
TIBCO EBX Add-ons versions 5.6.0 and below: update to version 5.6.1 or later
References
https://www.tibco.com/services/support/advisories
CVE-2022-41566
The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.