
CVE-2024-3182
https://notcve.org/view.php?id=CVE-2024-3182
15 May 2024 — Install-type password disclosure vulnerability in Universal Installer including the Silent Installer in TIBCO Hawk versions 6.2.0, 6.2.1, 6.2.2 and 6.2.3 allows user's Enterprise Message Service (EMS) password to be exposed outside of the hawkagent.cfg and hawkevent.cfg config files. Vulnerabilidad de divulgación de contraseña de tipo de instalación en Universal Installer, incluido Silent Installer en TIBCO Hawk versiones 6.2.0, 6.2.1, 6.2.2 y 6.2.3, permite que la contraseña del Enterprise Message Service ... • https://community.tibco.com/advisories/tibco-security-advisory-may-14-2024-tibco-hawk-cve-2024-3182-r213 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2023-26219 – TIBCO Operational Intelligence Hawk RedTail Credential Exposure Vulnerability
https://notcve.org/view.php?id=CVE-2023-26219
24 Oct 2023 — The Hawk Console and Hawk Agent components of TIBCO Software Inc.'s TIBCO Hawk, TIBCO Hawk Distribution for TIBCO Silver Fabric, TIBCO Operational Intelligence Hawk RedTail, and TIBCO Runtime Agent contain a vulnerability that theoretically allows an attacker with access to the Hawk Console’s and Agent’s log to obtain credentials used to access associated EMS servers. Affected releases are TIBCO Software Inc.'s TIBCO Hawk: versions 6.2.2 and below, TIBCO Hawk Distribution for TIBCO Silver Fabric: versions 6... • https://www.tibco.com/services/support/advisories • CWE-798: Use of Hard-coded Credentials •

CVE-2022-41564 – TIBCO Operational Intelligence Hawk Redtail Credential Exposure Vulnerability
https://notcve.org/view.php?id=CVE-2022-41564
14 Feb 2023 — The Hawk Console component of TIBCO Software Inc.'s TIBCO Hawk and TIBCO Operational Intelligence Hawk RedTail contains a vulnerability that will return the EMS transport password and EMS SSL password to a privileged user. Affected releases are TIBCO Software Inc.'s TIBCO Hawk: versions 6.1.0 through 6.2.1 and TIBCO Operational Intelligence Hawk RedTail: versions 7.0.0 through 7.2.0. • https://www.tibco.com/services/support/advisories • CWE-522: Insufficiently Protected Credentials •

CVE-2022-29167 – ReDoS vulnerability in header parsing in hawk
https://notcve.org/view.php?id=CVE-2022-29167
05 May 2022 — Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched... • https://github.com/mozilla/hawk/pull/286 • CWE-400: Uncontrolled Resource Consumption CWE-1333: Inefficient Regular Expression Complexity •