The TIBCO EBX Web Server component of TIBCO Software Inc.s TIBCO EBX, TIBCO EBX, TIBCO EBX, and TIBCO Product and Service Catalog powered by TIBCO EBX contains a vulnerability that under certain specific conditions allows an attacker to enter a password other than the legitimate password and it will be accepted as valid. Affected releases are TIBCO Software Inc.s TIBCO EBX: versions 5.8.123 and below, TIBCO EBX: versions 5.9.3, 5.9.4, 5.9.5, 5.9.6, 5.9.7, 5.9.8, 5.9.9, 5.9.10, 5.9.11, 5.9.12, 5.9.13, and 5.9.14, TIBCO EBX: versions 6.0.0 and 6.0.1, and TIBCO Product and Service Catalog powered by TIBCO EBX: version 1.0.0.
The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ebx | Tibco | * | 5.8.124 (excluding) |
Ebx | Tibco | 5.9.3 (including) | 5.9.15 (excluding) |
Ebx | Tibco | 6.0.0 (including) | 6.0.2 (excluding) |
Product_and_service_catalog_powered_by_tibco_ebx | Tibco | 1.0.0 (including) | 1.0.0 (including) |
A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:
Depending on the threat model, the password policy may include several additional attributes.
See NIST 800-63B [REF-1053] for further information on password requirements.