CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
22.0%
Original release date: May 17,2022
Last revised: —
CVE-2022-22773
Source: TIBCO Software Inc.
Products Affected
TIBCO JasperReports Server versions 8.0.1 and below
TIBCO JasperReports Server - Community Edition versions 8.0.1 and below
TIBCO JasperReports Server - Developer Edition versions 8.0.0 and below
TIBCO JasperReports Server for AWS Marketplace versions 8.0.1 and below
TIBCO JasperReports Server for ActiveMatrix BPM versions 7.9.2 and below
TIBCO JasperReports Server for Microsoft Azure versions 8.0.1 and below
The following component is affected:
Description
The component listed above contains difficult to exploit Reflected Cross Site
Scripting (XSS) vulnerabilities that allow a low privileged attacker with
network access to execute scripts targeting the affected system or the
victim’s local system.
Impact
In the worst case, if the victim is a privileged administrator, successful
execution of these vulnerabilities can result in an attacker gaining full
administrative access to the affected system.
CVSS v3 Base Score: 7.7 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N)
Solution
TIBCO has released updated versions of the affected systems which address this
issue:
TIBCO JasperReports Server versions 8.0.1 and below: update to version 8.0.2
or later
TIBCO JasperReports Server - Community Edition versions 8.0.1 and below:
update to version 8.0.2 or later
TIBCO JasperReports Server - Developer Edition versions 8.0.0 and below:
update to version 8.0.2 or later
TIBCO JasperReports Server for AWS Marketplace versions 8.0.1 and below:
update to version 8.0.2 or later
TIBCO JasperReports Server for ActiveMatrix BPM versions 7.9.2 and below:
This product is deprecated and should be uninstalled
TIBCO JasperReports Server for Microsoft Azure versions 8.0.1 and below:
update to version 8.0.2 or later
If an upgrade is not possible, browser rendering of the rest-api responses in
html & xml format can be disabled by restricting content type headers.
Instructions on restricting content type headers may be found here:
https://support.tibco.com/s/article/Security-Advisory-Regarding-TIBCO-JasperReports-Configuration-Change
Acknowledgments
TIBCO would like to extend its appreciation to Mohamed Rezgui for discovery of
this vulnerability.
References
https://www.tibco.com/services/support/advisories
CVE-2022-22773
The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
22.0%