- Description
- The Spring web flows of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contain a vulnerability which may allow any authenticated user read-only access to the contents of the web application, including key configuration files. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3;6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2.
- Source
- security@tibco.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.7
- Impact score
- 4
- Exploitability score
- 3.1
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Data from CISA
- Vulnerability name
- TIBCO JasperReports Server Information Disclosure Vulnerability
- Exploit added on
- Dec 29, 2022
- Exploit action due
- Jan 19, 2023
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "83D3533B-42CF-400B-A9E2-94302E009201",
"versionEndIncluding": "6.2.4"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"vulnerable": true,
"matchCriteriaId": "F8B7F2D6-580E-490B-83F5-56F76F125BA9",
"versionEndIncluding": "6.4.2"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "41D39313-991B-43DD-B830-06BE226E3FF6",
"versionEndIncluding": "6.4.2"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8FF00ED7-2B4C-4043-A061-84ADFB785C92"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D0B0408C-9F3F-48A7-A8B4-379B90557E95"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.3.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D32E717A-31B1-4415-B6B9-E39FAC38E756"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B714B874-89AD-49AD-8B8D-2EEDF6804E1C"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5A7A9802-61F8-45AC-B5C5-82521DF50B4F"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"vulnerable": true,
"matchCriteriaId": "E45760CC-1126-49FA-B86F-1DBEB379F4D4",
"versionEndIncluding": "6.4.2"
},
{
"criteria": "cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*",
"vulnerable": true,
"matchCriteriaId": "9B604288-1622-4FA1-B48B-9F11EB1C3140",
"versionEndIncluding": "6.4.2"
}
],
"operator": "OR"
}
]
}
]