Security Advisory for TIBCO tibbr Community and Enterprise
book
Article ID: KB0108114
calendar_today
Updated On:
Products
Versions
tibbr Community
5.2.1 and below, 6.0.0, 6.0.1, 7.0.0
Description
SAML protocol handling errors in tibbr
Original release date: December 12, 2017 Last revised: -- Source: TIBCO Software Inc.
Description
The tibbr components listed above contain SAML protocol handling errors which may allow authorized users to impersonate other users, and therefore escalate their access privileges.
Impact
The impact of this vulnerability includes, for already authorized users, the theoretical escalation of privileges to those of any other user.
CVSS v3 Base Score: 8.1 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
Environment
Systems Affected
tibbr Community versions 5.2.1 and below
tibbr Community versions 6.0.0 and 6.0.1
tibbr Community versions 7.0.0
tibbr Enterprise versions 5.2.1 and below
tibbr Enterprise versions 6.0.0 and 6.0.1
tibbr Enterprise version 7.0.0
The following components are affected:
* tibbr web server
Resolution
Solution
TIBCO has released updated versions of the affected components which address these issues.
For each affected system, update to the corresponding software versions:
For tibbr Community versions 5.2.1 and below, upgrade to version 5.2.2 or higher versions 6.0.X, upgrade to version 6.0.2 or higher version 7.0.0, upgrade to version 7.0.1 or higher
For tibbr Enterprise versions 5.2.1 and below, upgrade to version 5.2.2 or higher versions 6.0.X, upgrade to version 6.0.2 or higher version 7.0.0, upgrade to version 7.0.1 or higher
Issue/Introduction
Security Advisory for TIBCO tibbr Community and Enterprise