CVE-2021-28827 (GCVE-0-2021-28827)

Vulnerability from cvelistv5 – Published: 2021-04-20 18:30 – Updated: 2024-09-16 16:32
VLAI?
Summary
The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1.
CWE
  • In the worst case, if the victim is a privileged administrator successful execution of this vulnerability can result in an attacker gaining full administrative access to the affected system.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Administrator - Enterprise Edition Affected: unspecified , ≤ 5.10.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T21:55:12.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Administrator - Enterprise Edition",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "5.10.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Administrator - Enterprise Edition",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.11.0"
            },
            {
              "status": "affected",
              "version": "5.11.1"
            }
          ]
        },
        {
          "product": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "5.10.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.11.0"
            },
            {
              "status": "affected",
              "version": "5.11.1"
            }
          ]
        },
        {
          "product": "TIBCO Administrator - Enterprise Edition for z/Linux",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "5.10.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Administrator - Enterprise Edition for z/Linux",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.11.0"
            },
            {
              "status": "affected",
              "version": "5.11.1"
            }
          ]
        },
        {
          "product": "TIBCO Runtime Agent",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "5.10.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Runtime Agent",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.11.0"
            },
            {
              "status": "affected",
              "version": "5.11.1"
            }
          ]
        },
        {
          "product": "TIBCO Runtime Agent for z/Linux",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "5.10.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Runtime Agent for z/Linux",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.11.0"
            },
            {
              "status": "affected",
              "version": "5.11.1"
            }
          ]
        }
      ],
      "datePublic": "2021-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Administration GUI component of TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "In the worst case, if the victim is a privileged administrator successful execution of this vulnerability can result in an attacker gaining full administrative access to the affected system.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-20T19:06:16",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
        }
      ],
      "source": {
        "discovery": "USER"
      },
      "title": "TIBCO Administrator Stored Cross Site Scripting vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2021-04-20T17:00:00Z",
          "ID": "CVE-2021-28827",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Administrator Stored Cross Site Scripting vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Administrator - Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.10.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Administrator - Enterprise Edition",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.11.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "5.11.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.10.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.11.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "5.11.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.10.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Administrator - Enterprise Edition for z/Linux",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.11.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "5.11.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Runtime Agent",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.10.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Runtime Agent",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.11.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "5.11.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Runtime Agent for z/Linux",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.10.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Runtime Agent for z/Linux",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.11.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "5.11.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Administration GUI component of TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "In the worst case, if the victim is a privileged administrator successful execution of this vulnerability can result in an attacker gaining full administrative access to the affected system."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "CONFIRM",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher\nTIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher\nTIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher"
          }
        ],
        "source": {
          "discovery": "USER"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2021-28827",
    "datePublished": "2021-04-20T18:30:17.130237Z",
    "dateReserved": "2021-03-18T00:00:00",
    "dateUpdated": "2024-09-16T16:32:29.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:*:*:*\", \"versionEndIncluding\": \"5.10.2\", \"matchCriteriaId\": \"CCCCD52B-6905-41BD-83D9-A4B800E76BAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:silver_fabric:*:*\", \"versionEndIncluding\": \"5.10.2\", \"matchCriteriaId\": \"CF92E468-2FFA-4F3E-BC61-CFFC059627D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:z\\\\/linux:*:*\", \"versionEndIncluding\": \"5.10.2\", \"matchCriteriaId\": \"DA9D9C2C-1FCE-45E1-AB7A-9586C25A8969\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"C9291FEA-0386-42EF-94A6-20E599171D4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:silver_fabric:*:*\", \"matchCriteriaId\": \"EF42B5B6-2CCD-4124-8DAB-252912F413A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:z\\\\/linux:*:*\", \"matchCriteriaId\": \"A9D79741-41D8-44E7-9CD7-D3DEFE98CF57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"CE3C501F-2CEB-4300-9430-E2AB43009E74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:silver_fabric:*:*\", \"matchCriteriaId\": \"CC01905D-D082-4EDF-BF82-FB69ED80664A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:z\\\\/linux:*:*\", \"matchCriteriaId\": \"CC640410-CCFC-4B10-AF30-157F60ABF751\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.10.2\", \"matchCriteriaId\": \"71C3F347-702D-4D65-BDCC-7AC931C6736C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:z\\\\/linux:*:*\", \"versionEndIncluding\": \"5.10.2\", \"matchCriteriaId\": \"FCAFA333-6F13-48A0-8F08-4479AB3A9DDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:runtime_agent:5.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC0EB030-30DA-47D4-B504-0D7C4BE71D26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:runtime_agent:5.11.0:*:*:*:*:z\\\\/linux:*:*\", \"matchCriteriaId\": \"4EA0CB29-1E8E-454A-9801-065543A1C772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:runtime_agent:5.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEC7BD88-60FE-4855-9E2C-D45E09E10C5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:runtime_agent:5.11.1:*:*:*:*:z\\\\/linux:*:*\", \"matchCriteriaId\": \"4D588876-1E36-44BE-BFAC-76E1EDC7D771\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Administration GUI component of TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1.\"}, {\"lang\": \"es\", \"value\": \"El componente GUI de Administraci\\u00f3n de TIBCO Administrator - Enterprise Edition., TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition para z/Linux, TIBCO Administrator - Enterprise Edition para z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent para z/Linux y TIBCO Runtime Agent para z/Linux de TIBCO Inc, contiene una vulnerabilidad f\\u00e1cilmente explotable que permite a un atacante no autenticado hacer ingenier\\u00eda social a un usuario leg\\u00edtimo con acceso a la red para ejecutar un ataque de tipo XSS Almacenado dirigido al sistema afectado.\u0026#xa0;Un ataque con \\u00e9xito que utilice esta vulnerabilidad requiere una interacci\\u00f3n humana de una persona diferente del atacante. Las versiones afectadas son: TIBCO Administrator - Enterprise Edition: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.11.0 y 5.11.1, TIBCO Runtime Agent: versiones 5.10.2 y por debajo, TIBCO Runtime Agent: versiones 5.11.0 y 5.11.1, TIBCO Runtime Agent para z/Linux: versiones 5.10.2 y por debajo, y TIBCO Runtime Agent para z/Linux: versiones 5.11.0 y 5.11.1, de TIBCO Software Inc\"}]",
      "id": "CVE-2021-28827",
      "lastModified": "2024-11-21T06:00:16.823",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@tibco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2021-04-20T19:15:09.537",
      "references": "[{\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@tibco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-28827\",\"sourceIdentifier\":\"security@tibco.com\",\"published\":\"2021-04-20T19:15:09.537\",\"lastModified\":\"2024-11-21T06:00:16.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Administration GUI component of TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1.\"},{\"lang\":\"es\",\"value\":\"El componente GUI de Administraci\u00f3n de TIBCO Administrator - Enterprise Edition., TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition para z/Linux, TIBCO Administrator - Enterprise Edition para z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent para z/Linux y TIBCO Runtime Agent para z/Linux de TIBCO Inc, contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante no autenticado hacer ingenier\u00eda social a un usuario leg\u00edtimo con acceso a la red para ejecutar un ataque de tipo XSS Almacenado dirigido al sistema afectado.\u0026#xa0;Un ataque con \u00e9xito que utilice esta vulnerabilidad requiere una interacci\u00f3n humana de una persona diferente del atacante. Las versiones afectadas son: TIBCO Administrator - Enterprise Edition: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.11.0 y 5.11.1, TIBCO Runtime Agent: versiones 5.10.2 y por debajo, TIBCO Runtime Agent: versiones 5.11.0 y 5.11.1, TIBCO Runtime Agent para z/Linux: versiones 5.10.2 y por debajo, y TIBCO Runtime Agent para z/Linux: versiones 5.11.0 y 5.11.1, de TIBCO Software Inc\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@tibco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:*:*:*\",\"versionEndIncluding\":\"5.10.2\",\"matchCriteriaId\":\"CCCCD52B-6905-41BD-83D9-A4B800E76BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:silver_fabric:*:*\",\"versionEndIncluding\":\"5.10.2\",\"matchCriteriaId\":\"CF92E468-2FFA-4F3E-BC61-CFFC059627D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:z\\\\/linux:*:*\",\"versionEndIncluding\":\"5.10.2\",\"matchCriteriaId\":\"DA9D9C2C-1FCE-45E1-AB7A-9586C25A8969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"C9291FEA-0386-42EF-94A6-20E599171D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:silver_fabric:*:*\",\"matchCriteriaId\":\"EF42B5B6-2CCD-4124-8DAB-252912F413A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:z\\\\/linux:*:*\",\"matchCriteriaId\":\"A9D79741-41D8-44E7-9CD7-D3DEFE98CF57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"CE3C501F-2CEB-4300-9430-E2AB43009E74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:silver_fabric:*:*\",\"matchCriteriaId\":\"CC01905D-D082-4EDF-BF82-FB69ED80664A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:z\\\\/linux:*:*\",\"matchCriteriaId\":\"CC640410-CCFC-4B10-AF30-157F60ABF751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.10.2\",\"matchCriteriaId\":\"71C3F347-702D-4D65-BDCC-7AC931C6736C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:z\\\\/linux:*:*\",\"versionEndIncluding\":\"5.10.2\",\"matchCriteriaId\":\"FCAFA333-6F13-48A0-8F08-4479AB3A9DDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:runtime_agent:5.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0EB030-30DA-47D4-B504-0D7C4BE71D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:runtime_agent:5.11.0:*:*:*:*:z\\\\/linux:*:*\",\"matchCriteriaId\":\"4EA0CB29-1E8E-454A-9801-065543A1C772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:runtime_agent:5.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC7BD88-60FE-4855-9E2C-D45E09E10C5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:runtime_agent:5.11.1:*:*:*:*:z\\\\/linux:*:*\",\"matchCriteriaId\":\"4D588876-1E36-44BE-BFAC-76E1EDC7D771\"}]}]}],\"references\":[{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…