CVE-2011-2021
Published May 20, 2011
Last updated 7 years ago
Overview
- Description
- Session fixation vulnerability in TIBCO iProcess Engine before 11.1.3 and iProcess Workspace before 11.3.1 allows remote attackers to hijack web sessions via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:iprocess_engine:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF51C5E6-5856-43CE-929B-3E099483E494", "versionEndIncluding": "11.1.2" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F085498D-67C1-43D2-AAA2-35BA8AF1998E" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E90A12B-BEB4-4F51-B4D2-BA0DB127CE05" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBF898A2-46AA-4A79-8D85-2C34174AD44E" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B9388D9-CC97-487B-864C-F8FA9BFF7306" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "389EDDD9-4EFC-4B11-A3B9-C3BCD8D4DBAE" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CCBA1D2-6FDF-4D6F-9316-9B6F3A9BD50A" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F45470DC-9C5C-4CBE-8DFD-FE49008A0D14" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50CFE4BA-00B8-4334-9B67-0A4276F5FCEE" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "900BB34F-1533-4D53-904D-78E3D6EF3ED5" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94FDFA30-E50A-4AD1-81F6-39E58DCCC515" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF6D5769-8FE2-4923-94EE-92619D8D086A" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C65C714C-91B8-4665-B9BD-699BE318EDA2" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:10.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0832F843-1C4E-42D3-9FF0-935B93E221A5" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F054EC47-12B5-45B9-A526-B2EBEEB2378B" }, { "criteria": "cpe:2.3:a:tibco:iprocess_engine:11.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "249855DF-72EB-40E6-968A-E9F4698F7CED" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:iprocess_workspace:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A5FDEFE-0F9A-4D1F-A395-A1B34374BAB0", "versionEndIncluding": "11.3" }, { "criteria": "cpe:2.3:a:tibco:iprocess_workspace:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "722E8BF1-A77A-4CEB-99B7-EC4C87C17181" }, { "criteria": "cpe:2.3:a:tibco:iprocess_workspace:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49929B9A-97F1-48B9-B9E9-008111654FF1" }, { "criteria": "cpe:2.3:a:tibco:iprocess_workspace:11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47D79E53-5EA5-4D27-9EA4-DD6A99B39B65" } ], "operator": "OR" } ] } ]