{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T02:50:23.559","vulnerabilities":[{"cve":{"id":"CVE-2020-9413","sourceIdentifier":"security@tibco.com","published":"2020-06-30T20:15:13.313","lastModified":"2024-11-21T05:40:35.550","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The MFT Browser file transfer client and MFT Browser admin client components of TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center and TIBCO Managed File Transfer Internet Server contain a vulnerability that theoretically allows an attacker to craft an URL that will execute arbitrary commands on the affected system. If the attacker convinces an authenticated user with a currently active session to enter or click on the URL the commands will be executed on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center: versions 8.2.1 and below and TIBCO Managed File Transfer Internet Server: versions 8.2.1 and below."},{"lang":"es","value":"El cliente de transferencia de archivos de MFT Browser y los componentes del cliente de administración de MFT Browser del TIBCO Managed File Transfer Command Center and TIBCO Managed File Transfer Internet Server de TIBCO Software Inc, contienen una vulnerabilidad que teóricamente permite a un atacante crear una URL que ejecutará comandos arbitrarios en el sistema afectado. Si el atacante convence a un usuario autenticado con una sesión actualmente activa para que ingrese o haga clic en la URL, los comandos se ejecutarán en el sistema afectado. Las versiones afectadas son el TIBCO Managed File Transfer Command Center: versiones 8.2.1 y por debajo y TIBCO Managed File Transfer Internet Server: versiones 8.2.1 y por debajo, de TIBCO Software Inc"}],"metrics":{"cvssMetricV31":[{"source":"security@tibco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:managed_file_transfer_command_center:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"FE39BD76-859E-4CFC-97CD-7505BF0B7BFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:managed_file_transfer_internet_server:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"E380AF76-D71F-4D37-B0A9-BA4EC96F7D06"}]}]}],"references":[{"url":"http://www.tibco.com/services/support/advisories","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"http://www.tibco.com/services/support/advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}