Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:TIBCOIPROCESS
HistoryMay 18, 2011 - 7:00 p.m.

TIBCO Security Advisory: May 18, 2011 - TIBCOiProcess

2011-05-1819:00:00
Cloud Software Group, Inc.
community.tibco.com
5

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.7

Confidence

High

EPSS

0.005

Percentile

75.7%

TIBCO iProcess vulnerabilities

Original release date: May 18, 2011
Last revised: –
CVE-2011-2020, CVE-2011-2021
Source: TIBCO SoftwareInc.

TIBCO iProcess vulnerabilities

Original release date: May 18, 2011
Last revised: –
Source: TIBCO Software Inc.

Systems Affected

TIBCO iProcess Engine below 11.1.3
TIBCO iProcess Workspace (Browser) versions below 11.3.1

The following components are affected:

  • TIBCO iProcess Engine Server Manager
  • TIBCO iProcess Action Processor
  • TIBCO iProcess Workspace (Browser) Client
  • TIBCO iProcess Web Client Components (WCC)

Description

The TIBCO iProcess components listed above contain critical
vulnerabilities in the processing of inbound HTTP requests:

CVE-2011-2020 - A cross-site scripting vulnerability exists which
may allow an attacker to view or modify information in the database.

CVE-2011-2021 - A session fixation vulnerability exists which may allow
an attacker to hijack a web session from another user.

TIBCO has released updated versions of the affected software products
which address these issues. TIBCO strongly recommends sites running the
affected components install the applicable update or take corrective
action as described below.

Impact

The impact of these vulnerabilities may include information modification,
information disclosure, and denial of service.

Solution

For each affected system, update to the corresponding software versions:

TIBCO iProcess Engine version 11.1.3 or higher
TIBCO iProcess Workspace (Browser) version 11.3.1 or higher

This is strongly recommended.

If an upgrade is not possible, the following actions can mitigate the
vulnerability:

  • Utilize a firewall to restrict access to the TIBCO iProcess
    components.

References

http://www.tibco.com/mk/advisory.jsp
CVE: CVE-2011-2020, CVE-2011-2021

The information on this page is being provided to you on an"AS IS" and “AS-AVAILABLE” basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein.ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED.BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATIONCONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you donot have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.7

Confidence

High

EPSS

0.005

Percentile

75.7%

Related for TIBCO:TIBCOIPROCESS