Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-5530


The tibbr web server components of tibbr Community, and tibbr Enterprise contain SAML protocol handling errors which may allow authorized users to impersonate other users, and therefore escalate their access privileges. Affected releases are tibbr Community 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0, tibbr Enterprise 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0.


Published

2017-12-13T02:29:11.157

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tibco tibbr ≤ 5.2.1 Yes
Application tibco tibbr 6.0.0 Yes
Application tibco tibbr 6.0.1 Yes
Application tibco tibbr 7.0.0 Yes
Application tibco tibbr ≤ 5.2.1 Yes
Application tibco tibbr 6.0.0 Yes
Application tibco tibbr 6.0.1 Yes
Application tibco tibbr 7.0.0 Yes

References