Check the status of CVEs. Learn More.
Keeping your systems up 100% of the time requires live patching. Our solutions will align strongly with your risk, compliance, and operational uptime requirements.
TuxCare is trusted by the most innovative companies across the globe.
Learn about TuxCare's modern approach to reducing cybersecurity risk with Blogs, White Papers, and more.
Continually increasing Cybersecurity, stability, and availability of Linux servers and open source software since 2009.
TuxCare provides live security patching for numerous industries. Learn how TuxCare is minimizing risk for companies around the world.
2x a month. No spam.
January 11, 2023 - TuxCare expert team
The United States Cybersecurity and Infrastructure Security Agency (CISA) has added two-year-old security flaws, tracked as CVE-2018-5430 (CVSS score: 7.7) and CVE-2018-18809 (CVSS score: 9.9), affecting the TIBCO Software JasperReports product, to its list of Known Exploited Vulnerabilities, citing evidence of ongoing exploitation (KEV).
The first of the two flaws, CVE-2018-5430, is a server component information disclosure flaw that could grant a logged-in user read-only access to any number of files, including critical configurations. The impact includes the possibility of authenticated users having read-only access to web application configuration files containing the server’s credentials. According to a Tibco advisory published at the time, those credentials could then be used to affect external systems accessed by the JasperReports Server.
It can also refer to a server-side information disclosure bug that allows an authenticated user to read arbitrary files. The vulnerability grants any authenticated user read-only access to the web application’s contents, including key configuration files.
While the other flaw, CVE-2018-18809 is a directory traversal flaw in IBM products that could allow web server users to access private files on the host, potentially allowing an attacker to steal credentials and gain access to other systems. A directory-traversal vulnerability in the TIBCO JasperReports Library could allow web server users to access the host system’s contents.
While no public reports of malicious exploitation of the two vulnerabilities appear to exist, CISA only adds flaws to its ‘Must Patch’ list if it has reliable evidence of exploitation in the wild. Both vulnerabilities have technical details and proof-of-concept (PoC) exploits that are publicly available. CISA withheld any further information on how the vulnerabilities are being used as weapons in actual attacks, and federal agencies in the United States must patch their systems by January 19, 2023.
The JasperReports is a Java-based reporting and data analytics platform used for creating, distributing, and managing reports and dashboards.
The sources for this piece include an article in SecurityAffairs.
Learn About Live Patching with TuxCare
According to CyberArk researchers, GPT-based models like ChatGPT can be...
Malicious hackers have started exploiting a critical vulnerability CVE-2022-44877 in...
Deep Instinct researchers reported that RATs like StrRAT and Ratty...
According to CircleCI’s CTO, Rob Zuber, CircleCI is working with...
A remote attacker could exploit multiple vulnerabilities in four Cisco...
In a notable IcedID malware attack, the assailant impacted the...