{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T19:32:23.409","vulnerabilities":[{"cve":{"id":"CVE-2021-28827","sourceIdentifier":"security@tibco.com","published":"2021-04-20T19:15:09.537","lastModified":"2024-11-21T06:00:16.823","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1."},{"lang":"es","value":"El componente GUI de Administración de TIBCO Administrator - Enterprise Edition., TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition para z/Linux, TIBCO Administrator - Enterprise Edition para z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent para z/Linux y TIBCO Runtime Agent para z/Linux de TIBCO Inc, contiene una vulnerabilidad fácilmente explotable que permite a un atacante no autenticado hacer ingeniería social a un usuario legítimo con acceso a la red para ejecutar un ataque de tipo XSS Almacenado dirigido al sistema afectado.&#xa0;Un ataque con éxito que utilice esta vulnerabilidad requiere una interacción humana de una persona diferente del atacante. Las versiones afectadas son: TIBCO Administrator - Enterprise Edition: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition Distribution para TIBCO Silver Fabric: versiones 5.11.0 y 5.11.1, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.10.2 y por debajo, TIBCO Administrator - Enterprise Edition para z/Linux: versiones 5.11.0 y 5.11.1, TIBCO Runtime Agent: versiones 5.10.2 y por debajo, TIBCO Runtime Agent: versiones 5.11.0 y 5.11.1, TIBCO Runtime Agent para z/Linux: versiones 5.10.2 y por debajo, y TIBCO Runtime Agent para z/Linux: versiones 5.11.0 y 5.11.1, de TIBCO Software Inc"}],"metrics":{"cvssMetricV31":[{"source":"security@tibco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:*:*:*","versionEndIncluding":"5.10.2","matchCriteriaId":"CCCCD52B-6905-41BD-83D9-A4B800E76BAB"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:silver_fabric:*:*","versionEndIncluding":"5.10.2","matchCriteriaId":"CF92E468-2FFA-4F3E-BC61-CFFC059627D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:*:*:*:*:enterprise:z\\/linux:*:*","versionEndIncluding":"5.10.2","matchCriteriaId":"DA9D9C2C-1FCE-45E1-AB7A-9586C25A8969"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"C9291FEA-0386-42EF-94A6-20E599171D4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:silver_fabric:*:*","matchCriteriaId":"EF42B5B6-2CCD-4124-8DAB-252912F413A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:5.11.0:*:*:*:enterprise:z\\/linux:*:*","matchCriteriaId":"A9D79741-41D8-44E7-9CD7-D3DEFE98CF57"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:*:*:*","matchCriteriaId":"CE3C501F-2CEB-4300-9430-E2AB43009E74"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:silver_fabric:*:*","matchCriteriaId":"CC01905D-D082-4EDF-BF82-FB69ED80664A"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:administrator:5.11.1:*:*:*:enterprise:z\\/linux:*:*","matchCriteriaId":"CC640410-CCFC-4B10-AF30-157F60ABF751"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:*:*:*","versionEndIncluding":"5.10.2","matchCriteriaId":"71C3F347-702D-4D65-BDCC-7AC931C6736C"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:runtime_agent:*:*:*:*:*:z\\/linux:*:*","versionEndIncluding":"5.10.2","matchCriteriaId":"FCAFA333-6F13-48A0-8F08-4479AB3A9DDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:runtime_agent:5.11.0:*:*:*:*:*:*:*","matchCriteriaId":"DC0EB030-30DA-47D4-B504-0D7C4BE71D26"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:runtime_agent:5.11.0:*:*:*:*:z\\/linux:*:*","matchCriteriaId":"4EA0CB29-1E8E-454A-9801-065543A1C772"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:runtime_agent:5.11.1:*:*:*:*:*:*:*","matchCriteriaId":"CEC7BD88-60FE-4855-9E2C-D45E09E10C5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:tibco:runtime_agent:5.11.1:*:*:*:*:z\\/linux:*:*","matchCriteriaId":"4D588876-1E36-44BE-BFAC-76E1EDC7D771"}]}]}],"references":[{"url":"http://www.tibco.com/services/support/advisories","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827","source":"security@tibco.com","tags":["Vendor Advisory"]},{"url":"http://www.tibco.com/services/support/advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.tibco.com/support/advisories/2021/04/tibco-security-advisory-april-20-2021-tibco-administrator-2021-28827","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}