First published: Tue Jan 11 2022(Updated: )
The eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability that allows a low privileged attacker with network access to generate API tokens that can access any other channel with arbitrary permissions. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.7.2 and below, TIBCO eFTL - Developer Edition: versions 6.7.2 and below, and TIBCO eFTL - Enterprise Edition: versions 6.7.2 and below.
Credit: security@tibco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO eFTL | <=6.7.2 | |
TIBCO eFTL | <=6.7.2 | |
TIBCO eFTL | <=6.7.2 |
TIBCO has released updated versions of the affected components which address these issues. TIBCO eFTL - Community Edition versions 6.7.2 and below update to version 6.7.3 or later TIBCO eFTL - Developer Edition versions 6.7.2 and below update to version 6.7.3 or later TIBCO eFTL - Enterprise Edition versions 6.7.2 and below update to version 6.7.3 or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-43054.
TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition versions up to and including 6.7.2 are affected.
The severity of CVE-2021-43054 is high with a CVSS score of 8.8.
A low privileged attacker with network access can generate API tokens that can access any other resource.
Yes, you can find more information at the following references: [Link 1](https://www.tibco.com/services/support/advisories), [Link 2](https://www.tibco.com/support/advisories/2022/01/tibco-security-advisory-january-11-2022-tibco-eftl-2021-43054).