First published: Thu Mar 07 2019(Updated: )
This vulnerability allows the decryption of the passwords on vulnerable installations of Jaspersoft JasperReports Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within encryption of user passwords in the DiagnosticDataCipherer class. A hard-coded cryptographic key is used which can allow the reversal of the encryption process. An attacker can leverage this vulnerability in conjunction with other vulnerabilities to bypass authentication on the system.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jaspersoft Jasper Reports | ||
Tibco Jasperreports Server | <=6.4.3 | |
Tibco Jasperreports Server | <=7.1.0 | |
Tibco Jasperreports Server | =6.4.0 | |
Tibco Jasperreports Server | =6.4.1 | |
Tibco Jasperreports Server | =6.4.2 | |
Tibco Jasperreports Server | =6.4.3 | |
Tibco Jasperreports Server | =7.1.0 | |
Tibco Jaspersoft | <=7.1.0 | |
Tibco Jaspersoft Reporting And Analytics | <=7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18815 is a vulnerability in the REST API component of TIBCO JasperReports Server and TIBCO Jaspersoft products that allows for disclosure of hard-coded cryptographic key information.
CVE-2018-18815 has a severity rating of 9.8 (critical).
CVE-2018-18815 affects TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS.
To fix CVE-2018-18815, it is recommended to upgrade to a version that is not affected by the vulnerability.
More information about CVE-2018-18815 can be found in the TIBCO security advisory, Zero Day Initiative advisory, and the SecurityFocus vulnerability database.