First published: Tue Mar 23 2021(Updated: )
The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO API Exchange Gateway Distribution | <=2.3.3 | |
TIBCO API Exchange Gateway Distribution | <=2.3.3 |
TIBCO has released updated versions of the affected components which address these issues. TIBCO API Exchange Gateway versions 2.3.3 and below update to version 2.4.0 or higher TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric versions 2.3.3 and below update to version 2.4.0 or higher
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23274 is classified as a medium severity vulnerability that allows potential clickjacking attacks.
To remediate CVE-2021-23274, users should update TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution to version 2.3.4 or later.
CVE-2021-23274 affects users of TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution versions up to and including 2.3.3.
CVE-2021-23274 facilitates clickjacking attacks, allowing attackers to potentially deceive users into executing unintended actions.
No, CVE-2021-23274 can be exploited by an unauthenticated attacker with network access.