CVE-2018-12411 (GCVE-0-2018-12411)

Vulnerability from cvelistv5 – Published: 2018-11-07 00:00 – Updated: 2024-09-16 18:03
VLAI?
Summary
The administrative daemon (tibdgadmind) of TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.'s TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0, TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0, and TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0; 3.5.0.
CWE
  • In deployments that use the administrative daemon, there is a theoretical possibility that an attacker could gain full administrative access to the data grid, including the possibility of deleting data tables, and removing nodes from operation.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO ActiveSpaces - Community Edition Affected: 3.3.0
Affected: 3.4.0
Affected: 3.5.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO ActiveSpaces - Developer Edition Affected: 3.0.0
Affected: 3.1.0
Affected: 3.3.0
Affected: 3.4.0
Affected: 3.5.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO ActiveSpaces - Enterprise Edition Affected: 3.0.0
Affected: 3.1.0
Affected: 3.2.0
Affected: 3.3.0
Affected: 3.4.0
Affected: 3.5.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:38:05.058Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "name": "105869",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105869"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO ActiveSpaces - Community Edition",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.3.0"
            },
            {
              "status": "affected",
              "version": "3.4.0"
            },
            {
              "status": "affected",
              "version": "3.5.0"
            }
          ]
        },
        {
          "product": "TIBCO ActiveSpaces - Developer Edition",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.0.0"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "3.3.0"
            },
            {
              "status": "affected",
              "version": "3.4.0"
            },
            {
              "status": "affected",
              "version": "3.5.0"
            }
          ]
        },
        {
          "product": "TIBCO ActiveSpaces - Enterprise Edition",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.0.0"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "3.2.0"
            },
            {
              "status": "affected",
              "version": "3.3.0"
            },
            {
              "status": "affected",
              "version": "3.4.0"
            },
            {
              "status": "affected",
              "version": "3.5.0"
            }
          ]
        }
      ],
      "datePublic": "2018-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative daemon (tibdgadmind) of TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0, TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0, and TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0; 3.5.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "In deployments that use the administrative daemon, there is a theoretical possibility that an attacker could gain full administrative access to the data grid, including the possibility of deleting data tables, and removing nodes from operation.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-09T10:57:01",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "name": "105869",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105869"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO ActiveSpaces - Community Edition versions 3.3.0, 3.4.0, and 3.5.0 update to version 3.5.1 or higher\nTIBCO ActiveSpaces - Developer Edition versions 3.0.0, 3.1.0, 3.3.0, 3.4.0, and 3.5.0 update to version 3.5.1 or higher\nTIBCO ActiveSpaces - Enterprise Edition versions 3.0.0, 3.1.0, 3.2.0, 3.3.0, 3.4.0, and 3.5.0 update to version 3.5.1 or higher."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO ActiveSpaces Administrative Daemon Vulnerable to CSRF Attacks",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2018-11-06T17:00:00.000Z",
          "ID": "CVE-2018-12411",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO ActiveSpaces Administrative Daemon Vulnerable to CSRF Attacks"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO ActiveSpaces - Community Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.3.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.4.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.5.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO ActiveSpaces - Developer Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.1.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.3.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.4.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.5.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO ActiveSpaces - Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.1.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.2.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.3.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.4.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "3.5.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative daemon (tibdgadmind) of TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0, TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0, and TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0; 3.5.0."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "In deployments that use the administrative daemon, there is a theoretical possibility that an attacker could gain full administrative access to the data grid, including the possibility of deleting data tables, and removing nodes from operation."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces"
            },
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "MISC",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "105869",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105869"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO ActiveSpaces - Community Edition versions 3.3.0, 3.4.0, and 3.5.0 update to version 3.5.1 or higher\nTIBCO ActiveSpaces - Developer Edition versions 3.0.0, 3.1.0, 3.3.0, 3.4.0, and 3.5.0 update to version 3.5.1 or higher\nTIBCO ActiveSpaces - Enterprise Edition versions 3.0.0, 3.1.0, 3.2.0, 3.3.0, 3.4.0, and 3.5.0 update to version 3.5.1 or higher."
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2018-12411",
    "datePublished": "2018-11-07T00:00:00Z",
    "dateReserved": "2018-06-14T00:00:00",
    "dateUpdated": "2024-09-16T18:03:18.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.0.0:*:*:*:developer:*:*:*\", \"matchCriteriaId\": \"26A65290-4462-41FD-9602-4991D5A0D578\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.0.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"B6D969A4-95F9-4877-B4ED-4BC54F2A3D37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.1.0:*:*:*:developer:*:*:*\", \"matchCriteriaId\": \"72D84F48-2BC1-44D4-BF57-4F53C921BF7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.1.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"DFD369AE-67CE-4CEA-B389-5CEBD48A8586\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.2.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"8AC19705-96A9-4752-A08F-DCBBEDBCCD5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:community:*:*:*\", \"matchCriteriaId\": \"19990D0E-3616-4BEF-B695-7AA6092FC5E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:developer:*:*:*\", \"matchCriteriaId\": \"4F058395-B0FA-452E-AAEF-807E6A1E58C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"01C9B3B4-D5DB-4415-9994-C75B1BA97DAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:community:*:*:*\", \"matchCriteriaId\": \"9BE529F2-0745-4942-9148-8AC62EEDE8D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:developer:*:*:*\", \"matchCriteriaId\": \"51203932-C85B-4E7C-A3AC-E30B5BC4CAA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"C3D9EF5F-9D55-40D3-BB9C-9156E7CAFDFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:community:*:*:*\", \"matchCriteriaId\": \"97A8840C-082F-4E5A-8761-F785B4B128AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:developer:*:*:*\", \"matchCriteriaId\": \"F590E782-E08C-4756-9C5E-D53146043579\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"1ABC7D09-5465-415D-AC8B-B08AF42D500A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The administrative daemon (tibdgadmind) of TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0, TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0, and TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0; 3.5.0.\"}, {\"lang\": \"es\", \"value\": \"El demonio administrativo (tibdgadmind) de TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition y TIBCO ActiveSpaces - Enterprise Edition, de TIBCO Software Inc., contiene una vulnerabilidad que podr\\u00eda permitir que un atacante realice ataques de Cross-Site Request Forgery (CSRF). Las versiones afectadas son las siguientes: TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0; TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0; y TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0 y 3.5.0.\"}]",
      "id": "CVE-2018-12411",
      "lastModified": "2024-11-21T03:45:10.317",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"security@tibco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2018-11-06T23:29:00.230",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/105869\", \"source\": \"security@tibco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/105869\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@tibco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-352\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2018-12411\",\"sourceIdentifier\":\"security@tibco.com\",\"published\":\"2018-11-06T23:29:00.230\",\"lastModified\":\"2024-11-21T03:45:10.317\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The administrative daemon (tibdgadmind) of TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition, and TIBCO ActiveSpaces - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc.\u0027s TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0, TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0, and TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0; 3.5.0.\"},{\"lang\":\"es\",\"value\":\"El demonio administrativo (tibdgadmind) de TIBCO ActiveSpaces - Community Edition, TIBCO ActiveSpaces - Developer Edition y TIBCO ActiveSpaces - Enterprise Edition, de TIBCO Software Inc., contiene una vulnerabilidad que podr\u00eda permitir que un atacante realice ataques de Cross-Site Request Forgery (CSRF). Las versiones afectadas son las siguientes: TIBCO ActiveSpaces - Community Edition: 3.3.0; 3.4.0; 3.5.0; TIBCO ActiveSpaces - Developer Edition: 3.0.0; 3.1.0; 3.3.0; 3.4.0; 3.5.0; y TIBCO ActiveSpaces - Enterprise Edition: 3.0.0; 3.1.0; 3.2.0; 3.3.0; 3.4.0 y 3.5.0.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@tibco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.0.0:*:*:*:developer:*:*:*\",\"matchCriteriaId\":\"26A65290-4462-41FD-9602-4991D5A0D578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.0.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B6D969A4-95F9-4877-B4ED-4BC54F2A3D37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.1.0:*:*:*:developer:*:*:*\",\"matchCriteriaId\":\"72D84F48-2BC1-44D4-BF57-4F53C921BF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.1.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"DFD369AE-67CE-4CEA-B389-5CEBD48A8586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.2.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"8AC19705-96A9-4752-A08F-DCBBEDBCCD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:community:*:*:*\",\"matchCriteriaId\":\"19990D0E-3616-4BEF-B695-7AA6092FC5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:developer:*:*:*\",\"matchCriteriaId\":\"4F058395-B0FA-452E-AAEF-807E6A1E58C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"01C9B3B4-D5DB-4415-9994-C75B1BA97DAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:community:*:*:*\",\"matchCriteriaId\":\"9BE529F2-0745-4942-9148-8AC62EEDE8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:developer:*:*:*\",\"matchCriteriaId\":\"51203932-C85B-4E7C-A3AC-E30B5BC4CAA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.4.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"C3D9EF5F-9D55-40D3-BB9C-9156E7CAFDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:community:*:*:*\",\"matchCriteriaId\":\"97A8840C-082F-4E5A-8761-F785B4B128AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:developer:*:*:*\",\"matchCriteriaId\":\"F590E782-E08C-4756-9C5E-D53146043579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:activespaces:3.5.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"1ABC7D09-5465-415D-AC8B-B08AF42D500A\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/105869\",\"source\":\"security@tibco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2018/11/tibco-security-advisory-november-6-2018-tibco-activespaces\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…