First published: Wed Dec 13 2017(Updated: )
The tibbr user profiles components of tibbr Community, and tibbr Enterprise expose a weakness in an improperly sandboxed third-party component. Affected releases are TIBCO Software Inc. tibbr Community 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0, tibbr Enterprise 5.2.1 and below; 6.0.0; 6.0.1; 7.0.0.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Tibbr | <=5.2.1 | |
TIBCO Tibbr | =6.0.0 | |
TIBCO Tibbr | =6.0.1 | |
TIBCO Tibbr | =7.0.0 | |
TIBCO Tibbr | <=5.2.1 | |
TIBCO Tibbr | =6.0.0 | |
TIBCO Tibbr | =6.0.1 | |
TIBCO Tibbr | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5534 has been classified as a high severity vulnerability due to its potential to expose sensitive user profile information.
To fix CVE-2017-5534, it is recommended to upgrade to the latest patched version of TIBCO tibbr software.
CVE-2017-5534 affects TIBCO tibbr Community versions 5.2.1 and below, as well as versions 6.0.0, 6.0.1, and 7.0.0, along with TIBCO tibbr Enterprise versions 5.2.1 and below, and versions 6.0.0, 6.0.1, and 7.0.0.
CVE-2017-5534 can lead to unauthorized access to user profiles, potentially resulting in data leakage and exploitation.
Currently, there are no specific workarounds for CVE-2017-5534, and upgrading to a secure version is the recommended mitigation.