The Web server component of TIBCO Software Inc.'s TIBCO EBX, TIBCO EBX, TIBCO EBX, TIBCO EBX Add-ons, TIBCO EBX Add-ons, TIBCO EBX Add-ons, and TIBCO Product and Service Catalog powered by TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.8.124 and below, TIBCO EBX: versions 5.9.3, 5.9.4, 5.9.5, 5.9.6, 5.9.7, 5.9.8, 5.9.9, 5.9.10, 5.9.11, 5.9.12, 5.9.13, 5.9.14, and 5.9.15, TIBCO EBX: versions 6.0.0, 6.0.1, 6.0.2, and 6.0.3, TIBCO EBX Add-ons: versions 3.20.18 and below, TIBCO EBX Add-ons: versions 4.1.0, 4.2.0, 4.2.1, 4.2.2, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5, and 4.5.6, TIBCO EBX Add-ons: versions 5.0.0, 5.0.1, 5.1.0, 5.1.1, and 5.2.0, and TIBCO Product and Service Catalog powered by TIBCO EBX: versions 1.1.0 and below.
References
Link | Resource |
---|---|
https://www.tibco.com/services/support/advisories | Third Party Advisory |
https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-19-2022-tibco-ebx-2022-22769 | Third Party Advisory |
https://www.tibco.com/services/support/advisories | Third Party Advisory |
https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-19-2022-tibco-ebx-2022-22769 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tibco.com/services/support/advisories - Third Party Advisory | |
References | () https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-19-2022-tibco-ebx-2022-22769 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 8.0 |
26 Jan 2022, 15:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tibco:ebx:5.9.4:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.2.2:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.6:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.3:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.3.3:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.11:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.5:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.4.3:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.5:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:*:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:*:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.3.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.7:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.4:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.14:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.4.2:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.6:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.3:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.3.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.9:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.12:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.3.4:*:*:*:*:*:*:* cpe:2.3:a:tibco:product_and_service_catalog_powered_by_tibco_ebx:*:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.10:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.3.2:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.15:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.13:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.5.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:4.4.0:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx_add-ons:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:tibco:ebx:5.9.8:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.tibco.com/services/support/advisories - Third Party Advisory | |
References | (CONFIRM) https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-19-2022-tibco-ebx-2022-22769 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 9.0 |
CWE | CWE-79 |
19 Jan 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Jan 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-19 20:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22769
Mitre link : CVE-2022-22769
CVE.ORG link : CVE-2022-22769
JSON object : View
Products Affected
tibco
- product_and_service_catalog_powered_by_tibco_ebx
- ebx_add-ons
- ebx
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')