First published: Tue Nov 06 2018(Updated: )
The realm server (tibrealmserver) component of TIBCO Software Inc. TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a vulnerability which may allow an attacker to perform cross-site request forgery (CSRF) attacks. Affected releases are TIBCO Software Inc. TIBCO FTL - Community Edition: versions up to and including 5.4.0, TIBCO FTL - Developer Edition: versions up to and including 5.4.0, TIBCO FTL - Enterprise Edition: versions up to and including 5.4.0.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO FTL | >=1.0.0<5.4.0 |
TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions: TIBCO FTL - Community Edition versions 5.4.0 and below update to version 5.4.1 or higher TIBCO FTL - Developer Edition versions 5.4.0 and below update to version 5.4.1 or higher TIBCO FTL - Enterprise Edition versions 5.4.0 and below update to version 5.4.1 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12412 is a vulnerability in the realm server (tibrealmserver) component of TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition that allows for cross-site request forgery (CSRF) attacks.
CVE-2018-12412 has a severity rating of 8.8 (high).
An attacker can exploit CVE-2018-12412 by performing cross-site request forgery (CSRF) attacks.
Versions 1.0.0 through 5.4.0 of TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition are affected by CVE-2018-12412.
To mitigate CVE-2018-12412, it is recommended to upgrade to a version of TIBCO FTL that is not affected by the vulnerability. Additionally, you should follow secure coding practices and implement strong CSRF protection mechanisms.