TIBCO Managed File Transfer Platform Server for IBM i Authentication Bypass
Original release date: June 9, 2020
Last revised:
CVE-2020-9411
Source: TIBCOSoftware Inc.
TIBCO Managed File Transfer Platform Server for IBM i Authentication Bypass
Original release date: June 9, 2020
Last revised: ---
Source: TIBCO Software Inc.
Systems Affected
TIBCO Managed File Transfer Platform Server for IBM i versions 7.1.0 and
below
TIBCO Managed File Transfer Platform Server for IBM i version 8.0.0
The following component is affected:
* file transfer
Description
The component listed above contains a vulnerability that theoretically allows
an attacker to perform unauthorized network file transfers to and from the
file system accessible to the affected component. This vulnerability is
exploitable when the configuration option 'Require Node Resp' is set to 'No'.
In the event of a successful exploit, the attacker could theoretically read
and write any file on the file system accessible to the affected component,
thus fully affecting the confidentiality, integrity, and availability of the
operating system hosting the deployment of the affected system.
Impact
The impact of this vulnerability includes the possibility that an attacker
could gain access to the contents of files they are otherwise not authorized
to see, and modify files they otherwise should not be able to change, and
affect the availability of the hosting system, by way of damaging critical
system files.
CVSS v3 Base Score: 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Solution
TIBCO has released updated versions of the affected systems which address this
issue:
TIBCO Managed File Transfer Platform Server for IBM i versions 7.1.0 and
below update to version 7.1.1 or higher
TIBCO Managed File Transfer Platform Server for IBM i version 8.0.0 update
to version 8.0.1 or higher
For an alternate remediation, change the configuration option 'Require Node
Resp' to 'Yes', and also explicitly add all of the nodes accessing the
affected system that have not yet been added to the configuration.
References
http://www.tibco.com/services/support/advisories
CVE-2020-9411
The information on this page is being provided toyou on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the informationcontained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AREHEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THEINFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement.If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.