- Description
- The Scheduler Connection component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contains an easily exploitable vulnerability that allows an authenticated attacker with network access to obtain FTP server passwords for other users of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 7.2.1 and below, TIBCO JasperReports Server: versions 7.5.0 and 7.5.1, TIBCO JasperReports Server: version 7.8.0, TIBCO JasperReports Server: version 7.9.0, TIBCO JasperReports Server - Community Edition: versions 7.8.0 and below, TIBCO JasperReports Server - Developer Edition: versions 7.9.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and below, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and below, and TIBCO JasperReports Server for Microsoft Azure: version 7.8.0.
- Source
- security@tibco.com
- NVD status
- Modified
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:-:*:*",
"vulnerable": true,
"matchCriteriaId": "E87BF137-85ED-436B-B489-BAC6E1EDD4D2",
"versionEndIncluding": "7.2.1"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:microsoft_azure:*:*",
"vulnerable": true,
"matchCriteriaId": "EC19CCA7-EFDE-4D1F-817A-31E0FC8769CA",
"versionEndIncluding": "7.8.0"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DF6B9A0D-3531-44BA-B69B-4E3816FF0A62",
"versionEndIncluding": "7.8.0"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"vulnerable": true,
"matchCriteriaId": "460EDE2D-4363-43D1-804E-E13D45CC1D62",
"versionEndIncluding": "7.9.0"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:aws_marketplace:*:*",
"vulnerable": true,
"matchCriteriaId": "4E99B51D-A190-4819-A8FE-95E26C272ED3",
"versionEndIncluding": "7.9.0"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:developer:*:*:*",
"vulnerable": true,
"matchCriteriaId": "96707798-F82B-433A-AC20-E59B2711EABF",
"versionEndIncluding": "7.9.0"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:7.5.0:*:*:*:*:-:*:*",
"vulnerable": true,
"matchCriteriaId": "C01DD2E2-BAE8-44E4-A0BE-E60850EF3286"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:7.5.1:*:*:*:*:-:*:*",
"vulnerable": true,
"matchCriteriaId": "A3648C6D-345F-482F-ACA9-58F1E3A37591"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:7.8.0:*:*:*:*:-:*:*",
"vulnerable": true,
"matchCriteriaId": "0D39A041-5F31-4457-BE1C-B685306DD407"
},
{
"criteria": "cpe:2.3:a:tibco:jasperreports_server:7.9.0:*:*:*:*:-:*:*",
"vulnerable": true,
"matchCriteriaId": "C68AA2D6-C235-48FF-9266-FEFCFDAABC44"
}
],
"operator": "OR"
}
]
}
]