CVE-2022-22773

7.7 HIGH

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in TIBCO JasperReports Server's REST API. A low-privileged attacker with network access can inject malicious scripts that execute in victims' browsers, potentially compromising their sessions or local systems. All TIBCO JasperReports Server editions up to version 8.0.1 are affected.

💻 Affected Systems

Products:
  • TIBCO JasperReports Server
  • TIBCO JasperReports Server - Community Edition
  • TIBCO JasperReports Server - Developer Edition
  • TIBCO JasperReports Server for AWS Marketplace
  • TIBCO JasperReports Server for ActiveMatrix BPM
  • TIBCO JasperReports Server for Microsoft Azure
Versions: Up to 8.0.1 for most editions, up to 7.9.2 for ActiveMatrix BPM edition
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged network access to REST API endpoints

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, perform session hijacking, install malware on user systems, or pivot to internal network attacks.

🟠

Likely Case

Session theft for low-privileged users, data exfiltration from user browsers, or limited account compromise.

🟢

If Mitigated

With proper input validation and output encoding, impact is limited to script execution in isolated browser contexts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Vulnerability is described as 'difficult to exploit' and requires low-privileged access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.0 or later for most editions, consult vendor advisory for specific versions

Vendor Advisory: https://www.tibco.com/support/advisories/2022/05/tibco-security-advisory-may-17-2022-tibco-jasperreports-server-cve-2022-22773

Restart Required: Yes

Instructions:

1. Download latest version from TIBCO support portal. 2. Backup current installation. 3. Apply patch following vendor documentation. 4. Restart JasperReports Server services.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to sanitize REST API parameters

Configure WAF rules to filter script tags and JavaScript in REST API parameters

Access Restriction

all

Restrict network access to JasperReports Server REST API endpoints

Configure firewall rules to limit access to trusted IP addresses only

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check JasperReports Server version against affected versions list

Check Version:

Check version in JasperReports Server web interface or installation directory

Verify Fix Applied:

Verify installation of version 8.1.0 or later, or specific patched version per vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API requests with script tags or JavaScript payloads
  • Multiple failed authentication attempts followed by successful low-privileged access

Network Indicators:

  • HTTP requests containing script injection patterns to REST API endpoints
  • Outbound connections to suspicious domains from user browsers

SIEM Query:

source="jasperreports" AND (http_uri="*/rest/*" AND (http_query="*<script*" OR http_query="*javascript:*"))

🔗 References

📤 Share & Export