Files
CVEs-PoC/2021/CVE-2021-35498.md
2025-09-29 21:09:30 +02:00

34 lines
2.8 KiB
Markdown

### [CVE-2021-35498](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35498)
![](https://img.shields.io/static/v1?label=Product&message=TIBCO%20EBX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TIBCO%20Product%20and%20Service%20Catalog%20powered%20by%20TIBCO%20EBX&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.10%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.11%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.13%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.14%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.9.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=In%20the%20worst%20case%2C%20if%20the%20targeted%20account%20is%20a%20privileged%20administrator%2C%20successful%20exploitation%20of%20this%20vulnerability%20can%20result%20in%20an%20attacker%20gaining%20full%20administrative%20access%20to%20the%20affected%20system.&color=brightgreen)
### Description
The TIBCO EBX Web Server component of TIBCO Software Inc.'s TIBCO EBX, TIBCO EBX, TIBCO EBX, and TIBCO Product and Service Catalog powered by TIBCO EBX contains a vulnerability that under certain specific conditions allows an attacker to enter a password other than the legitimate password and it will be accepted as valid. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.8.123 and below, TIBCO EBX: versions 5.9.3, 5.9.4, 5.9.5, 5.9.6, 5.9.7, 5.9.8, 5.9.9, 5.9.10, 5.9.11, 5.9.12, 5.9.13, and 5.9.14, TIBCO EBX: versions 6.0.0 and 6.0.1, and TIBCO Product and Service Catalog powered by TIBCO EBX: version 1.0.0.
### POC
#### Reference
- https://www.tibco.com/services/support/advisories
#### Github
No PoCs found on GitHub currently.