Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBCO-NIMBUS-CVE-2022-41559
HistoryDec 02, 2022 - 11:05 p.m.

TIBCO Security Advisory: December 6, 2022 - TIBCO Nimbus -CVE-2022-41559

2022-12-0223:05:37
Cloud Software Group, Inc.
community.tibco.com
4
tibco
nimbus
open redirect
vulnerability
unauthenticated
attacker
commands
privileges
update
version 10.5.1

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

7.4 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

51.6%

TIBCO Nimbus Open Redirect Vulnerability

Original release date: December 6, 2022
Lastrevised: —
CVE-2022-41559
Source: TIBCOSoftware Inc.

Products Affected

TIBCO Nimbus version 10.5.0

The following component is affected:

  • Web Client

Description

The component listed above contains an easily exploitable vulnerability that
allows an unauthenticated attacker with network access to exploit an open
redirect on the affected system. A successful attack using this vulnerability
requires human interaction from a person other than the attacker.

Impact

Successful execution of these vulnerabilities will result in an attacker being
able to execute commands with the privileges of the affected user.

CVSS v3.1 Base Score: 9.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N)

Solution

TIBCO has released updated versions of the affected systems which address this
issue:

TIBCO Nimbus version 10.5.0: update to version 10.5.1 or later

References

https://www.tibco.com/services/support/advisories
CVE-2022-41559

The information on this page is being provided toyou on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the informationcontained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AREHEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THEINFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement.If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.

CPENameOperatorVersion
tibco nimbuseq10.5.0

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

7.4 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

51.6%

Related for TIBCO:TIBCO-NIMBUS-CVE-2022-41559