Introducing the all-new TIBCO Community site!

For current users, please click "Sign In" to reset your password and access the enhanced features. If you're a first-time visitor, we extend a warm welcome—click "Sign Up" to become a part of the TIBCO Community!

If you're seeking alternative community sites, explore ibi, Jaspersoft, and Spotfire.

Jump to content
  • TIBCO Security Advisory: December 12, 2017 - tibbr -2017-5530


    admin

    SAML protocol handling errors in tibbr

    Original release date: December 12, 2017
    Last revised:--
    CVE-2017-5530
    Source: TIBCO SoftwareInc.

    SAML protocol handling errors in tibbr

    Original release date: December 12, 2017
    Last revised: --
    Source: TIBCO Software Inc.


    Systems Affected

    tibbr Community versions 5.2.1 and below
    tibbr Community versions 6.0.0 and 6.0.1
    tibbr Community version 7.0.0

    tibbr Enterprise versions 5.2.1 and below
    tibbr Enterprise versions 6.0.0 and 6.0.1
    tibbr Enterprise version 7.0.0

    The following components are affected:

    * tibbr web server


    Description

    The tibbr components listed above contain SAML protocol handling errors
    which may allow authorized users to impersonate other users, and therefore
    escalate their access privileges.


    Impact

    The impact of this vulnerability includes, for already authorized users,
    the theoretical escalation of privileges to those of any other user.

    CVSS v3 Base Score: 8.1 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)


    Solution

    TIBCO has released updated versions of the affected components which address
    these issues.

    For each affected system, update to the corresponding software versions:

    For tibbr Community
    versions 5.2.1 and below, upgrade to version 5.2.2 or higher
    versions 6.0.X, upgrade to version 6.0.2 or higher
    version 7.0.0, upgrade to version 7.0.1 or higher

    For tibbr Enterprise
    versions 5.2.1 and below, upgrade to version 5.2.2 or higher
    versions 6.0.X, upgrade to version 6.0.2 or higher
    version 7.0.0, upgrade to version 7.0.1 or higher


    References

    http://www.tibco.com/services/support/advisories
    CVE: CVE-2017-5530

    The information on this page is being provided to you on an"AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein.ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED.BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATIONCONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you donot have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...