CVE-2021-28827

TIBCO Administrator Stored Cross Site Scripting vulnerability

Description

The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Runtime Agent, TIBCO Runtime Agent, TIBCO Runtime Agent for z/Linux, and TIBCO Runtime Agent for z/Linux contains an easily exploitable vulnerability that allows an unauthenticated attacker to social engineer a legitimate user with network access to execute a Stored XSS attack targeting the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric: versions 5.11.0 and 5.11.1, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.10.2 and below, TIBCO Administrator - Enterprise Edition for z/Linux: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent: versions 5.10.2 and below, TIBCO Runtime Agent: versions 5.11.0 and 5.11.1, TIBCO Runtime Agent for z/Linux: versions 5.10.2 and below, and TIBCO Runtime Agent for z/Linux: versions 5.11.0 and 5.11.1.

Remediation

Solution:

  • TIBCO has released updated versions of the affected components which address these issues. TIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher

Category

9.6
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.61%
Vendor Advisory tibco.com Vendor Advisory tibco.com
Affected: TIBCO Software Inc. TIBCO Administrator - Enterprise Edition
Affected: TIBCO Software Inc. TIBCO Administrator - Enterprise Edition
Affected: TIBCO Software Inc. TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric
Affected: TIBCO Software Inc. TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric
Affected: TIBCO Software Inc. TIBCO Administrator - Enterprise Edition for z/Linux
Affected: TIBCO Software Inc. TIBCO Administrator - Enterprise Edition for z/Linux
Affected: TIBCO Software Inc. TIBCO Runtime Agent
Affected: TIBCO Software Inc. TIBCO Runtime Agent
Affected: TIBCO Software Inc. TIBCO Runtime Agent for z/Linux
Affected: TIBCO Software Inc. TIBCO Runtime Agent for z/Linux
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-28827?
CVE-2021-28827 has been scored as a critical severity vulnerability.
How to fix CVE-2021-28827?
To fix CVE-2021-28827: TIBCO has released updated versions of the affected components which address these issues. TIBCO Administrator - Enterprise Edition versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Administrator - Enterprise Edition versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Administrator - Enterprise Edition for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Administrator - Enterprise Edition for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Runtime Agent versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Runtime Agent versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher TIBCO Runtime Agent for z/Linux versions 5.10.2 and below update to version 5.10.3 or higher TIBCO Runtime Agent for z/Linux versions 5.11.0 and 5.11.1 update to version 5.11.2 or higher
Is CVE-2021-28827 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-28827 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-28827?
CVE-2021-28827 affects TIBCO Software Inc. TIBCO Administrator - Enterprise Edition, TIBCO Software Inc. TIBCO Administrator - Enterprise Edition, TIBCO Software Inc. TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Software Inc. TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Software Inc. TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Software Inc. TIBCO Administrator - Enterprise Edition for z/Linux, TIBCO Software Inc. TIBCO Runtime Agent, TIBCO Software Inc. TIBCO Runtime Agent, TIBCO Software Inc. TIBCO Runtime Agent for z/Linux, TIBCO Software Inc. TIBCO Runtime Agent for z/Linux.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.