Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBBR-2017-5530
HistoryDec 06, 2017 - 10:41 p.m.

TIBCO Security Advisory: December 12, 2017 - tibbr -2017-5530

2017-12-0622:41:09
Cloud Software Group, Inc.
community.tibco.com
5

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

28.4%

SAML protocol handling errors in tibbr

Original release date: December 12, 2017
Last revised:–
CVE-2017-5530
Source: TIBCO SoftwareInc.

SAML protocol handling errors in tibbr

Original release date: December 12, 2017
Last revised: –
Source: TIBCO Software Inc.

Systems Affected

tibbr Community versions 5.2.1 and below
tibbr Community versions 6.0.0 and 6.0.1
tibbr Community version 7.0.0

tibbr Enterprise versions 5.2.1 and below
tibbr Enterprise versions 6.0.0 and 6.0.1
tibbr Enterprise version 7.0.0

The following components are affected:

  • tibbr web server

Description

The tibbr components listed above contain SAML protocol handling errors
which may allow authorized users to impersonate other users, and therefore
escalate their access privileges.

Impact

The impact of this vulnerability includes, for already authorized users,
the theoretical escalation of privileges to those of any other user.

CVSS v3 Base Score: 8.1 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)

Solution

TIBCO has released updated versions of the affected components which address
these issues.

For each affected system, update to the corresponding software versions:

For tibbr Community
versions 5.2.1 and below, upgrade to version 5.2.2 or higher
versions 6.0.X, upgrade to version 6.0.2 or higher
version 7.0.0, upgrade to version 7.0.1 or higher

For tibbr Enterprise
versions 5.2.1 and below, upgrade to version 5.2.2 or higher
versions 6.0.X, upgrade to version 6.0.2 or higher
version 7.0.0, upgrade to version 7.0.1 or higher

References

http://www.tibco.com/services/support/advisories
CVE: CVE-2017-5530

The information on this page is being provided to you on an"AS IS" and “AS-AVAILABLE” basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein.ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED.BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATIONCONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you donot have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.

5.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

28.4%

Related for TIBCO:TIBBR-2017-5530