Search criteria

4 vulnerabilities found for Deployment Kit used in Spotfire Server by Spotfire

CVE-2025-3115 (GCVE-0-2025-3115)

Vulnerability from cvelistv5 – Published: 2025-04-09 18:12 – Updated: 2025-11-11 11:47
VLAI?
Summary
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
Impacted products
Vendor Product Version
Spotfire Spotfire Statistics Services Affected: 14 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Analyst Affected: 14.0 , < 14.0.6 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Deployment Kit used in Spotfire Server Affected: 14.0 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Desktop Affected: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire for AWS Marketplace Unknown: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire Enterprise Runtime for R - Server Edition Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 (Patch)
Affected: 1.19.0 (Patch)
Affected: 1.20.0 (Patch)
Affected: 1.21.0 (Patch)
Affected: 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for Python Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for R Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3115",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:28:35.698097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:29:39.691Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Statistics Services",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.6",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Deployment Kit used in Spotfire Server",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Desktop",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "affected",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "unknown",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Enterprise Runtime for R - Server Edition",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.19.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.20.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for Python",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for R",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\n\n\u003cstrong\u003eInjection Vulnerabilities: \u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAttackers can inject malicious code, potentially gaining control over the system executing these functions.\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution\u003c/span\u003e\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution"
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-11T11:47:58.064Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3115-r3485/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Spotfire Data Function Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2025-3115",
    "datePublished": "2025-04-09T18:12:28.348Z",
    "dateReserved": "2025-04-02T10:56:03.148Z",
    "dateUpdated": "2025-11-11T11:47:58.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-3114 (GCVE-0-2025-3114)

Vulnerability from cvelistv5 – Published: 2025-04-09 17:29 – Updated: 2025-04-15 20:29
VLAI?
Summary
Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
  • CWE-693 - Protection Mechanism Failure
Assigner
Impacted products
Vendor Product Version
Spotfire Spotfire Enterprise Runtime for R Affected: 6 , ≤ 1.4 (Patch)
Create a notification for this product.
    Spotfire Spotfire Statistics Services Affected: 14 , ≤ 0.6 (Patch)
Affected: 14.1.0
Affected: 14.2.0
Affected: 14.3.0
Affected: 14.4.0
Affected: 14.4.1
Create a notification for this product.
    Spotfire Spotfire Analyst Affected: 14 , ≤ 0.5 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Deployment Kit used in Spotfire Server Affected: 14 , ≤ 0.6 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Desktop Affected: 14 , ≤ 4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire for AWS Marketplace Unknown: 14 , ≤ 4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Enterprise Runtime for R - Server Edition Affected: 1 , ≤ 17.6 (Patch)
Affected: 1.18.0 (Patch)
Affected: 1.19.0 (Patch)
Affected: 1.20.0 (Patch)
Affected: 1.21.0 (Patch)
Affected: 1.21.1 (Patch)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3114",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:03:07.615805Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T20:29:11.223Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Enterprise Runtime for R",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "1.4",
              "status": "affected",
              "version": "6",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Statistics Services",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "0.6",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0"
            },
            {
              "status": "affected",
              "version": "14.2.0"
            },
            {
              "status": "affected",
              "version": "14.3.0"
            },
            {
              "status": "affected",
              "version": "14.4.0"
            },
            {
              "status": "affected",
              "version": "14.4.1"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "0.5",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Deployment Kit used in Spotfire Server",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "0.6",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Desktop",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "4.1",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "4.1",
              "status": "unknown",
              "version": "14",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Enterprise Runtime for R - Server Edition",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "17.6",
              "status": "affected",
              "version": "1",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.19.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.20.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.1",
              "versionType": "Patch"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cstrong\u003eCode Execution via Malicious Files:\u003c/strong\u003e\u0026nbsp;Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSandbox Bypass Vulnerability:\u003c/strong\u003e\u0026nbsp;A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.\u003c/p\u003e"
            }
          ],
          "value": "Code Execution via Malicious Files:\u00a0Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.\n\nSandbox Bypass Vulnerability:\u00a0A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T17:29:48.612Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3114-r3484/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Spotfire Code Execution Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2025-3114",
    "datePublished": "2025-04-09T17:29:48.612Z",
    "dateReserved": "2025-04-02T10:55:41.023Z",
    "dateUpdated": "2025-04-15T20:29:11.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-3115 (GCVE-0-2025-3115)

Vulnerability from nvd – Published: 2025-04-09 18:12 – Updated: 2025-11-11 11:47
VLAI?
Summary
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
Impacted products
Vendor Product Version
Spotfire Spotfire Statistics Services Affected: 14 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Analyst Affected: 14.0 , < 14.0.6 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Deployment Kit used in Spotfire Server Affected: 14.0 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Desktop Affected: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire for AWS Marketplace Unknown: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire Enterprise Runtime for R - Server Edition Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 (Patch)
Affected: 1.19.0 (Patch)
Affected: 1.20.0 (Patch)
Affected: 1.21.0 (Patch)
Affected: 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for Python Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for R Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3115",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:28:35.698097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:29:39.691Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Statistics Services",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.6",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Deployment Kit used in Spotfire Server",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Desktop",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "affected",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "unknown",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Enterprise Runtime for R - Server Edition",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.19.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.20.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for Python",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for R",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\n\n\u003cstrong\u003eInjection Vulnerabilities: \u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAttackers can inject malicious code, potentially gaining control over the system executing these functions.\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution\u003c/span\u003e\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution"
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-11T11:47:58.064Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3115-r3485/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Spotfire Data Function Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2025-3115",
    "datePublished": "2025-04-09T18:12:28.348Z",
    "dateReserved": "2025-04-02T10:56:03.148Z",
    "dateUpdated": "2025-11-11T11:47:58.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-3114 (GCVE-0-2025-3114)

Vulnerability from nvd – Published: 2025-04-09 17:29 – Updated: 2025-04-15 20:29
VLAI?
Summary
Code Execution via Malicious Files: Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise. Sandbox Bypass Vulnerability: A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
  • CWE-693 - Protection Mechanism Failure
Assigner
Impacted products
Vendor Product Version
Spotfire Spotfire Enterprise Runtime for R Affected: 6 , ≤ 1.4 (Patch)
Create a notification for this product.
    Spotfire Spotfire Statistics Services Affected: 14 , ≤ 0.6 (Patch)
Affected: 14.1.0
Affected: 14.2.0
Affected: 14.3.0
Affected: 14.4.0
Affected: 14.4.1
Create a notification for this product.
    Spotfire Spotfire Analyst Affected: 14 , ≤ 0.5 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Deployment Kit used in Spotfire Server Affected: 14 , ≤ 0.6 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Desktop Affected: 14 , ≤ 4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire for AWS Marketplace Unknown: 14 , ≤ 4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Enterprise Runtime for R - Server Edition Affected: 1 , ≤ 17.6 (Patch)
Affected: 1.18.0 (Patch)
Affected: 1.19.0 (Patch)
Affected: 1.20.0 (Patch)
Affected: 1.21.0 (Patch)
Affected: 1.21.1 (Patch)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3114",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:03:07.615805Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T20:29:11.223Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Enterprise Runtime for R",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "1.4",
              "status": "affected",
              "version": "6",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Statistics Services",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "0.6",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0"
            },
            {
              "status": "affected",
              "version": "14.2.0"
            },
            {
              "status": "affected",
              "version": "14.3.0"
            },
            {
              "status": "affected",
              "version": "14.4.0"
            },
            {
              "status": "affected",
              "version": "14.4.1"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "0.5",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Deployment Kit used in Spotfire Server",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "0.6",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Desktop",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "4.1",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "4.1",
              "status": "unknown",
              "version": "14",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Enterprise Runtime for R - Server Edition",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThanOrEqual": "17.6",
              "status": "affected",
              "version": "1",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.19.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.20.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.1",
              "versionType": "Patch"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cstrong\u003eCode Execution via Malicious Files:\u003c/strong\u003e\u0026nbsp;Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSandbox Bypass Vulnerability:\u003c/strong\u003e\u0026nbsp;A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls.\u003c/p\u003e"
            }
          ],
          "value": "Code Execution via Malicious Files:\u00a0Attackers can create specially crafted files with embedded code that may execute without adequate security validation, potentially leading to system compromise.\n\nSandbox Bypass Vulnerability:\u00a0A flaw in the TERR security mechanism allows attackers to bypass sandbox restrictions, enabling the execution of untrusted code without appropriate controls."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T17:29:48.612Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3114-r3484/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Spotfire Code Execution Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2025-3114",
    "datePublished": "2025-04-09T17:29:48.612Z",
    "dateReserved": "2025-04-02T10:55:41.023Z",
    "dateUpdated": "2025-04-15T20:29:11.223Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}