Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBCOFTL
HistoryOct 30, 2018 - 10:23 p.m.

TIBCO Security Advisory:November 6, 2018 - TIBCOFTL

2018-10-3022:23:43
Cloud Software Group, Inc.
community.tibco.com
6

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.0%

TIBCO FTL Realm Server Vulnerable to CSRF Attacks

Original release date: November 6,2018
Last revised:
CVE-2018-12412
Source: TIBCO Software Inc.

TIBCO FTL Realm Server Vulnerable to CSRF Attacks

Original release date: November 6, 2018
Last revised:
Source: TIBCO Software Inc.

Systems Affected

TIBCO FTL - Community Edition versions 5.4.0 and below

TIBCO FTL - Developer Edition versions 5.4.0 and below

TIBCO FTL - Enterprise Edition versions 5.4.0 and below

The following components are affected:

  • realm server (tibrealmserver)

Description

The component listed above contains a vulnerability which may allow an
attacker to perform cross-site request forgery (CSRF) attacks.

Impact

The impact of this vulnerability includes the theoretical possibility that
an attacker could gain full access to realm configuration. With such access,
the attacker might also be able to gain access to all data sent to endpoints
controlled by the realm server.

CVSS v3 Base Score: 7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)

Solution

TIBCO has released updated versions of the affected components which address
these issues.

For each affected system, update to the corresponding software versions:

TIBCO FTL - Community Edition versions 5.4.0 and below update to
version 5.4.1 or higher

TIBCO FTL - Developer Edition versions 5.4.0 and below update to
version 5.4.1 or higher

TIBCO FTL - Enterprise Edition versions 5.4.0 and below update to
version 5.4.1 or higher

References

http://www.tibco.com/services/support/advisories
CVE-2018-12412

The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.0%

Related for TIBCO:TIBCOFTL