cve-2017-5529
Vulnerability from cvelistv5
Published
2017-06-29 14:00
Modified
2024-09-17 02:52
Severity ?
EPSS score ?
Summary
TIBCO JasperReports Library Information Disclosure
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | TIBCO Software Inc. | TIBCO JasperReports Library Community Edition |
Version: 6.4.0 |
||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:04:15.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017-0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TIBCO JasperReports Library Community Edition", "vendor": "TIBCO Software Inc.", "versions": [ { "status": "affected", "version": "6.4.0" } ] }, { "product": "TIBCO JasperReports Library for ActiveMatrix BPM", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TIBCO JasperReports Professional", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.2.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "6.3.0" } ] }, { "product": "TIBCO JasperReports Server", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "6.2.0" }, { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.3.0" } ] }, { "product": "TIBCO JasperReports Server Community Edition", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.3.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TIBCO JasperReports Server for ActiveMatrix BPM", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TIBCO Jaspersoft for AWS with Multi-Tenancy", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.3.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TIBCO Jaspersoft Reporting and Analytics for AWS", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.3.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TIBCO Jaspersoft Studio for ActiveMatrix BPM", "vendor": "TIBCO Software Inc.", "versions": [ { "lessThanOrEqual": "6.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2017-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "JasperReports library components contain an information disclosure vulnerability. This vulnerability includes the theoretical disclosure of any accessible information from the host file system. Affects TIBCO JasperReports Library Community Edition (versions 6.4.0 and below), TIBCO JasperReports Library for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO JasperReports Professional (versions 6.2.1 and below, and 6.3.0), TIBCO JasperReports Server (versions 6.1.1 and below, 6.2.0, 6.2.1, 6.3.0), TIBCO JasperReports Server Community Edition (versions 6.3.0 and below), TIBCO JasperReports Server for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO Jaspersoft for AWS with Multi-Tenancy (versions 6.3.0 and below), TIBCO Jaspersoft Reporting and Analytics for AWS (versions 6.3.0 and below), and TIBCO Jaspersoft Studio for ActiveMatrix BPM (versions 6.2.0 and below)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/A:N/AC:L/AV:N/C:L/I:N/PR:L/S:C/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-15T21:06:41", "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db", "shortName": "tibco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017-0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" } ], "title": "TIBCO JasperReports Library Information Disclosure", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@tibco.com", "DATE_PUBLIC": "2017-06-28T09:00:00-07", "ID": "CVE-2017-5529", "STATE": "PUBLIC", "TITLE": "TIBCO JasperReports Library Information Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TIBCO JasperReports Library Community Edition", "version": { "version_data": [ { "version_value": "6.4.0", "versions_affected": "\u003c=" } ] } }, { "product_name": "TIBCO JasperReports Library for ActiveMatrix BPM", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.2.0" } ] } }, { "product_name": "TIBCO JasperReports Professional", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.2.1" }, { "version_value": "6.3.0" } ] } }, { "product_name": "TIBCO JasperReports Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.1.1" }, { "version_value": "6.2.0" }, { "version_value": "6.2.1" }, { "version_value": "6.3.0" } ] } }, { "product_name": "TIBCO JasperReports Server Community Edition", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.3.0" } ] } }, { "product_name": "TIBCO JasperReports Server for ActiveMatrix BPM", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.2.0" } ] } }, { "product_name": "TIBCO Jaspersoft for AWS with Multi-Tenancy", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.3.0" } ] } }, { "product_name": "TIBCO Jaspersoft Reporting and Analytics for AWS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.3.0" } ] } }, { "product_name": "TIBCO Jaspersoft Studio for ActiveMatrix BPM", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.2.0" } ] } } ] }, "vendor_name": "TIBCO Software Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JasperReports library components contain an information disclosure vulnerability. This vulnerability includes the theoretical disclosure of any accessible information from the host file system. Affects TIBCO JasperReports Library Community Edition (versions 6.4.0 and below), TIBCO JasperReports Library for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO JasperReports Professional (versions 6.2.1 and below, and 6.3.0), TIBCO JasperReports Server (versions 6.1.1 and below, 6.2.0, 6.2.1, 6.3.0), TIBCO JasperReports Server Community Edition (versions 6.3.0 and below), TIBCO JasperReports Server for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO Jaspersoft for AWS with Multi-Tenancy (versions 6.3.0 and below), TIBCO Jaspersoft Reporting and Analytics for AWS (versions 6.3.0 and below), and TIBCO Jaspersoft Studio for ActiveMatrix BPM (versions 6.2.0 and below)." } ] }, "impact": { "cvssv3": { "BM": { "A": "N", "AC": "L", "AV": "N", "C": "L", "I": "N", "PR": "L", "S": "C", "UI": "R" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017-0", "refsource": "CONFIRM", "url": "https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017-0" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db", "assignerShortName": "tibco", "cveId": "CVE-2017-5529", "datePublished": "2017-06-29T14:00:00Z", "dateReserved": "2017-01-19T00:00:00", "dateUpdated": "2024-09-17T02:52:33.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-5529\",\"sourceIdentifier\":\"security@tibco.com\",\"published\":\"2017-06-29T14:29:00.210\",\"lastModified\":\"2024-11-21T03:27:49.540\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"JasperReports library components contain an information disclosure vulnerability. This vulnerability includes the theoretical disclosure of any accessible information from the host file system. Affects TIBCO JasperReports Library Community Edition (versions 6.4.0 and below), TIBCO JasperReports Library for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO JasperReports Professional (versions 6.2.1 and below, and 6.3.0), TIBCO JasperReports Server (versions 6.1.1 and below, 6.2.0, 6.2.1, 6.3.0), TIBCO JasperReports Server Community Edition (versions 6.3.0 and below), TIBCO JasperReports Server for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO Jaspersoft for AWS with Multi-Tenancy (versions 6.3.0 and below), TIBCO Jaspersoft Reporting and Analytics for AWS (versions 6.3.0 and below), and TIBCO Jaspersoft Studio for ActiveMatrix BPM (versions 6.2.0 and below).\"},{\"lang\":\"es\",\"value\":\"Los componentes de la biblioteca JasperReports contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. Esta vulnerabilidad incluye la divulgaci\u00f3n, en teor\u00eda, de cualquier informaci\u00f3n accesible desde el sistema de archivos del host. Afecta a TIBCO JasperReports Library Community Edition (versiones 6.4.0 y anteriores), TIBCO JasperReports Library for ActiveMatrix BPM (versiones 6.2.0 y anteriores), TIBCO JasperReports Professional (versiones 6.2.1 y anteriores y la versi\u00f3n 6.3.0), TIBCO JasperReports Server (versiones 6.1.1 y anteriores, 6.2.0, 6.2.1 y 6.3.0), TIBCO JasperReports Server Community Edition (versiones 6.3.0 y anteriores), TIBCO JasperReports Server for ActiveMatrix BPM (versiones 6.2.0 y anteriores), TIBCO Jaspersoft for AWS with Multi-Tenancy (versiones 6.3.0 y anteriores), TIBCO Jaspersoft Reporting and Analytics for AWS (versiones 6.3.0 y anteriores) y TIBCO Jaspersoft Studio for ActiveMatrix BPM (versiones 6.2.0 y anteriores).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@tibco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N\",\"baseScore\":4.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_library_community_edition:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.4.0\",\"matchCriteriaId\":\"92BADDE3-0215-4B61-9EF4-EBEBCDDC618F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_library_for_activematrix_bpm:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.0\",\"matchCriteriaId\":\"4C41772A-63F9-4CCD-8DBE-105F8A2EF59B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_professional:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.1\",\"matchCriteriaId\":\"053B3DCB-B3DA-4257-940D-D95041266461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_professional:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"117FDD9C-EC7B-4102-B90C-5B3BF67143C4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.1\",\"matchCriteriaId\":\"EB779293-3B1E-4EFA-9949-194F50DF7829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_server:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A9B006-2D34-4F4B-90D2-3AA6F4008C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_server:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B3F43A-CBE2-4E1C-B2D8-CABDDE37E639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_server:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF00ED7-2B4C-4043-A061-84ADFB785C92\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_server_community_edition:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.3.0\",\"matchCriteriaId\":\"36FAD9BF-8E18-4547-8F86-3ECB0625C82A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jasperreports_server_for_activematrix_bpm:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.0\",\"matchCriteriaId\":\"BAD91052-9CD6-46CC-A8C1-97B4C728E4FC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jaspersoft_for_aws_with_multi-tenancy:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.3.0\",\"matchCriteriaId\":\"BDDCA701-8160-40CC-9BB9-A1325EB7ABD6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics_for_aws:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.3.0\",\"matchCriteriaId\":\"D1C80725-2AEE-4A9D-A5E4-4747359AA7CE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:jaspersoft_studio_for_activematrix_bpm:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.0\",\"matchCriteriaId\":\"3CB2E7DF-C120-47DF-B1A4-063E91824560\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"security@tibco.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"security@tibco.com\"},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"security@tibco.com\"},{\"url\":\"https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017-0\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tibco.com/support/advisories/2017/06/tibco-security-advisory-june-28-2017-tibco-jasperreports-server-2017-0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.