Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBCO-IWAY-SERVICE-MANAGER-CVE-2022-30571
HistoryJul 27, 2022 - 1:48 a.m.

TIBCO Security Advisory: August 2, 2022 - TIBCO iWay Service Manager -CVE-2022-30571

2022-07-2701:48:00
Cloud Software Group, Inc.
community.tibco.com
2
tibco iway service manager
cross site scripting
cve-2022-30571
vulnerabilities
administrative access

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.7%

TIBCO iWay Service Manager Reflected Cross Site Scripting (XSS)

Original release date: August 2, 2022
Last revised: —
CVE-2022-30571
Source: TIBCO Software Inc.

Products Affected

TIBCO iWay Service Manager versions 8.0.6 and below

The following component is affected:

  • iWay Service Manager Console

Description

The component listed above contains easily exploitable Reflected Cross Site
Scripting (XSS) vulnerabilities that allow a low privileged attacker with
network access to execute scripts targeting the affected system or the
victim’s local system.

Impact

In the worst case, if the victim is a privileged administrator, successful
execution of these vulnerabilities can result in an attacker gaining full
administrative access to the affected system.

CVSS v3.1 Base Score: 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)

Solution

TIBCO has released updated versions of the affected systems which address this
issue:

TIBCO iWay Service Manager versions 8.0.6 and below: update to version 8.0.7
or later

References

https://www.tibco.com/services/support/advisories
CVE-2022-30571

The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.

CPENameOperatorVersion
tibco iway service managerle8.0.6

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.7%

Related for TIBCO:TIBCO-IWAY-SERVICE-MANAGER-CVE-2022-30571