CVE-2022-22771

8.8 HIGH

📋 TL;DR

This directory traversal vulnerability in TIBCO JasperReports products allows authenticated web server users to access files outside the intended directory on the host system. It affects multiple JasperReports Server and Library versions across various deployment platforms. The vulnerability could expose sensitive system files to unauthorized users.

💻 Affected Systems

Products:
  • TIBCO JasperReports Library
  • TIBCO JasperReports Library for ActiveMatrix BPM
  • TIBCO JasperReports Server
  • TIBCO JasperReports Server for AWS Marketplace
  • TIBCO JasperReports Server for ActiveMatrix BPM
  • TIBCO JasperReports Server for Microsoft Azure
Versions: 7.9.0 and 7.9.1 (specific products vary)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web server components; requires authenticated access to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files including configuration files, credentials, and application data, potentially leading to full system compromise.

🟠

Likely Case

Authenticated users accessing files they shouldn't have permission to view, potentially exposing sensitive business data or system information.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit once discovered

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version 7.9.2 or later

Vendor Advisory: https://www.tibco.com/support/advisories/2022/03/tibco-security-advisory-march-15-2022-tibco-jasperreports-library-2022-22771

Restart Required: Yes

Instructions:

1. Download the patched version from TIBCO support portal. 2. Backup current installation. 3. Install the update following TIBCO documentation. 4. Restart the JasperReports service.

🔧 Temporary Workarounds

Restrict network access

all

Limit access to JasperReports Server to trusted networks only

Implement web application firewall rules

all

Block directory traversal patterns in WAF

🧯 If You Can't Patch

  • Implement strict access controls and limit user permissions
  • Monitor file access logs for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check the version in JasperReports Server admin interface or configuration files

Check Version:

Check jasperreports.properties or server logs for version information

Verify Fix Applied:

Confirm version is 7.9.2 or later and test directory traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests with '../' sequences in URLs
  • Access to files outside expected directories

Network Indicators:

  • HTTP requests containing directory traversal sequences

SIEM Query:

source="jasperreports" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export