Overview
- Description
- The HTML escaping component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for Microsoft Azure, and TIBCO JasperReports Server for Microsoft Azure contains an easily exploitable vulnerability that allows a privileged/administrative attacker with network access to execute an XSS attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 8.0.2 and below, TIBCO JasperReports Server: version 8.1.0, TIBCO JasperReports Server - Community Edition: versions 8.1.0 and below, TIBCO JasperReports Server - Developer Edition: versions 8.1.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 8.0.2 and below, TIBCO JasperReports Server for AWS Marketplace: version 8.1.0, TIBCO JasperReports Server for Microsoft Azure: versions 8.0.2 and below, and TIBCO JasperReports Server for Microsoft Azure: version 8.1.0.
- Source
- security@tibco.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.4
- Impact score
- 6
- Exploitability score
- 1.7
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:aws_marketplace:*:*", "vulnerable": true, "matchCriteriaId": "91DB82ED-9088-4F05-AD56-61AE11A91BA4", "versionEndIncluding": "8.0.2" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:microsoft_azure:*:*", "vulnerable": true, "matchCriteriaId": "749AC80E-AD50-4694-8B4B-4039DB5FCEAF", "versionEndIncluding": "8.0.2" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:-:-:*:*", "vulnerable": true, "matchCriteriaId": "A9319193-3E3B-4EB0-A962-7BD9C4FAF629", "versionEndIncluding": "8.0.2" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "0D95FFE6-6E17-4603-9566-A918D72A83F9", "versionEndIncluding": "8.1.0" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:developer:*:*:*", "vulnerable": true, "matchCriteriaId": "41E6EB22-15A8-412A-BFF3-F350DBE09C7A", "versionEndIncluding": "8.1.0" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:8.1.0:*:*:*:*:aws_marketplace:*:*", "vulnerable": true, "matchCriteriaId": "3150F6F9-AA6A-4778-BFA4-DB4750E739C7" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:8.1.0:*:*:*:*:microsoft_azure:*:*", "vulnerable": true, "matchCriteriaId": "DC1B969A-B2E8-4E6C-81DF-3B50706B8A7D" }, { "criteria": "cpe:2.3:a:tibco:jasperreports_server:8.1.0:*:*:*:-:-:*:*", "vulnerable": true, "matchCriteriaId": "E856A341-8D2F-439E-A10F-38F68442B966" } ], "operator": "OR" } ] } ]