#VU57327 XML External Entity injection in TIBCO Server applications


Published: 2021-10-13

Vulnerability identifier: #VU57327

Vulnerability risk: Medium

CVSSv3.1: 4 [CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35496

CWE-ID: CWE-611

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
TIBCO JasperReports Server
Web applications / Other software
TIBCO JasperReports Server - Community Edition
Server applications / Other server solutions
TIBCO JasperReports Server - Developer Edition
Server applications / Other server solutions
TIBCO JasperReports Server for AWS Marketplace
Server applications / Other server solutions
TIBCO JasperReports Server for ActiveMatrix BPM
Server applications / Other server solutions
TIBCO JasperReports Server for Microsoft Azure
Server applications / Other server solutions

Vendor: JasperSoft
TIBCO

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient validation of user-supplied XML input in the XMLA Connections component. A remote authenticated attacker can gain unauthorized read access, as well as unauthorized update, insert or delete access to a subset of the affected systems data and cause a denial of servie (DoS) condition.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

TIBCO JasperReports Server: 4.7 - 7.9.0

TIBCO JasperReports Server - Community Edition: 7.8.0

TIBCO JasperReports Server - Developer Edition: 7.9.0

TIBCO JasperReports Server for AWS Marketplace: 7.9.0

TIBCO JasperReports Server for ActiveMatrix BPM: 7.9.0

TIBCO JasperReports Server for Microsoft Azure: 7.8.0


External links
http://www.tibco.com/services/support/advisories
http://www.tibco.com/support/advisories/2021/10/tibco-security-advisory-october-12-2021-tibco-jasperreports-server-2021-35496


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability