TIBCO takes its security responsibilities very seriously. This page provides information about TIBCO security and how customers or security researchers can contact TIBCO to report or ask about a security issue.
TIBCO Security Advisory: November 16, 2021 - TIBCO PartnerExpress - 2021-43047
- TIBCO PartnerExpress versions 6.2.1 and below
The following components are affected:
- Interior Server
- Gateway Server
The components listed above contain easily exploitable Stored and Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker.
In the worst case, if the victim is a privileged administrator, successful execution of these vulnerabilities can result in an attacker gaining full administrative access to the affected system or the victim's local system.
CVSS v3 Base Score: 9.0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
TIBCO has released updated versions of the affected systems which address this issue:
- TIBCO PartnerExpress versions 6.2.1 and below update to version 6.2.2 or later