First published: Wed Dec 13 2017(Updated: )
The tibbr web server components of tibbr Community, and tibbr Enterprise contain SAML protocol handling errors which may allow authorized users to impersonate other users, and therefore escalate their access privileges. Affected releases are tibbr Community 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0, tibbr Enterprise 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO tibbr | <=5.2.1 | |
TIBCO tibbr | =6.0.0 | |
TIBCO tibbr | =6.0.1 | |
TIBCO tibbr | =7.0.0 | |
TIBCO tibbr | <=5.2.1 | |
TIBCO tibbr | =6.0.0 | |
TIBCO tibbr | =6.0.1 | |
TIBCO tibbr | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-5530 is rated as high with a score of 8.1.
To fix CVE-2017-5530, users should upgrade to a version of tibbr that is not affected, specifically versions above 7.0.0 or the latest security patches.
CVE-2017-5530 affects tibbr Community versions up to and including 5.2.1, as well as 6.0.0, 6.0.1, and 7.0.0, and tibbr Enterprise versions up to 5.2.1 and 6.0.0, 6.0.1, and 7.0.0.
CVE-2017-5530 is a vulnerability related to SAML protocol handling errors, allowing authorized users to impersonate others.
CVE-2017-5530 may allow authorized users to impersonate other users, resulting in potential unauthorized access and privilege escalation.