TIBCO Managed File Transfer Internet Server prior 7.0 session fixiation
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.6 | $0-$5k | 0.00 |
A vulnerability classified as problematic has been found in TIBCO Managed File Transfer Internet Server (File Transfer Software). This affects an unknown functionality. The manipulation with an unknown input leads to a session fixiation vulnerability. CWE is classifying the issue as CWE-384. Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions. This is going to have an impact on integrity. The summary by CVE is:
Session fixation vulnerability in the Managed File Transfer server in TIBCO Managed File Transfer Internet Server before 7.1.1 and Managed File Transfer Command Center before 7.1.1, and the server in TIBCO Slingshot before 1.8.1, allows remote attackers to hijack web sessions via unspecified vectors.
The weakness was presented 09/19/2011 (Website). It is possible to read the advisory at securityfocus.com. This vulnerability is uniquely identified as CVE-2011-3424 since 09/12/2011. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available.
Upgrading to version 7.0 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at X-Force (69805). See 58562 for similar entry.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Session fixiationCWE: CWE-384
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Managed File Transfer Internet Server 7.0
Timeline
09/12/2011 🔍09/14/2011 🔍
09/14/2011 🔍
09/15/2011 🔍
09/19/2011 🔍
09/19/2011 🔍
03/23/2015 🔍
03/02/2018 🔍
Sources
Vendor: tibco.comAdvisory: securityfocus.com⛔
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2011-3424 (🔍)
X-Force: 69805 - Multiple TIBCO Managed File Transfer products session hijacking
SecurityTracker: 1026051
SecurityFocus: 49619 - TIBCO Managed File Transfer Products Session Fixation and Cross Site Scripting Vulnerabilities
Secunia: 45976 - TIBCO Managed File Transfer Products Cross-Site Scripting and Session Fixation Vulnerabili, Less Critical
OSVDB: 75397
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 03/02/2018 10:13
Changes: 03/23/2015 16:50 (64), 03/02/2018 10:13 (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.