Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBCOBUSINESSCONNECT-CVE-2022-41567
HistoryFeb 21, 2023 - 9:37 p.m.

TIBCO Security Advisory: February 22, 2023 - TIBCOBusinessConnect -CVE-2022-41567

2023-02-2121:37:21
Cloud Software Group, Inc.
community.tibco.com
tibco businessconnect
stored xss
vulnerability
cve-2022-41567
cross-site scripting
security advisory

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.0%

TIBCO BusinessConnect Stored XSS Vulnerability

Original release date: February 22, 2023
Lastrevised: —
CVE-2022-41567
Source: TIBCOSoftware Inc.

Products Affected

TIBCO BusinessConnect versions 7.3.0 and below

The following component is affected:

  • BusinessConnect UI

Description

The component listed above contains an easily exploitable vulnerability that
allows a low privileged attacker with network access to execute a cross-site
scripting (XSS) attack on the affected system.

Impact

Successful execution of this attack could result in the ability to perform
actions within the context of another user including reading, updating,
inserting, or deleting data accessible to TIBCO BusinessConnect.

CVSS v3.1 Base Score: 7.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)

Solution

TIBCO has released updated versions of the affected systems which address
these issues:

TIBCO BusinessConnect versions 7.3.0 and below: update to version 7.3.1 or
later

References

https://www.tibco.com/services/support/advisories
CVE-2022-41567

The information on this page is being provided toyou on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the informationcontained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AREHEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THEINFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement.If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.

CPENameOperatorVersion
tibco businessconnectle7.3.0

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.0%

Related for TIBCO:TIBCOBUSINESSCONNECT-CVE-2022-41567