First published: Wed Apr 24 2019(Updated: )
The workspace client, openspace client, app development client, and REST API of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, and TIBCO Silver Fabric Enabler for ActiveMatrix BPM contain cross site scripting (XSS) and cross-site request forgery vulnerabilities. Affected releases are TIBCO Software Inc.'s TIBCO ActiveMatrix BPM: versions up to and including 4.2.0, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric: versions up to and including 4.2.0, and TIBCO Silver Fabric Enabler for ActiveMatrix BPM: versions up to and including 1.4.1.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO ActiveMatrix Business Process Management | <=4.2.0 | |
TIBCO ActiveMatrix Business Process Management | <=4.2.0 | |
TIBCO Silver Fabric Enabler | <=1.4.1 |
TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions: TIBCO ActiveMatrix BPM versions 4.2.0 and below update to version 4.3.0 or higher TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric versions 4.2.0 and below update to 4.3.0 or higher TIBCO Silver Fabric Enabler for ActiveMatrix BPM versions 1.4.1 and below update to version 1.4.2 or higher
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11203 has been categorized with a high severity due to its potential for cross site scripting attacks.
To fix CVE-2019-11203, users should update TIBCO ActiveMatrix BPM, TIBCO Silver Fabric, and related software to their latest versions.
CVE-2019-11203 allows attackers to perform cross site scripting (XSS) attacks, potentially compromising user data.
CVE-2019-11203 affects TIBCO ActiveMatrix BPM and TIBCO Silver Fabric, including versions up to 4.2.0 and 1.4.1 respectively.
No official workaround has been provided for CVE-2019-11203, hence updating to the secure version is recommended.