Overview
- Description
- The Spring web flows of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contain a vulnerability which may allow any authenticated user read-only access to the contents of the web application, including key configuration files. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3;6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2.
- Source
- security@tibco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.7
- Impact score
- 4
- Exploitability score
- 3.1
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Known exploits
Data from CISA
- Vulnerability name
- TIBCO JasperReports Server Information Disclosure Vulnerability
- Exploit added on
- Dec 29, 2022
- Exploit action due
- Jan 19, 2023
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83D3533B-42CF-400B-A9E2-94302E009201", "versionEndIncluding": "6.2.4" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*", "vulnerable": true, "matchCriteriaId": "F8B7F2D6-580E-490B-83F5-56F76F125BA9", "versionEndIncluding": "6.4.2" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "41D39313-991B-43DD-B830-06BE226E3FF6", "versionEndIncluding": "6.4.2" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FF00ED7-2B4C-4043-A061-84ADFB785C92" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0B0408C-9F3F-48A7-A8B4-379B90557E95" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D32E717A-31B1-4415-B6B9-E39FAC38E756" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B714B874-89AD-49AD-8B8D-2EEDF6804E1C" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A7A9802-61F8-45AC-B5C5-82521DF50B4F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*", "vulnerable": true, "matchCriteriaId": "E45760CC-1126-49FA-B86F-1DBEB379F4D4", "versionEndIncluding": "6.4.2" }, { "criteria": "cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*", "vulnerable": true, "matchCriteriaId": "9B604288-1622-4FA1-B48B-9F11EB1C3140", "versionEndIncluding": "6.4.2" } ], "operator": "OR" } ] } ]