Search criteria

36 vulnerabilities found for spotfire_analyst by tibco

FKIE_CVE-2025-3115

Vulnerability from fkie_nvd - Published: 2025-04-09 18:15 - Updated: 2025-11-11 12:15
Severity ?
Summary
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "E4B95026-0F1F-498E-A9F6-E6C8128C96D7",
              "versionEndExcluding": "6.1.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32EAFEE-068C-411B-835A-3EB904EF1D72",
              "versionEndExcluding": "14.0.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_statistics_services:14.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C020EF-6D20-4898-B87C-947856FFA863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_statistics_services:14.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1658C79B-930F-4810-AEA0-CA028AAF0C40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_statistics_services:14.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9366B298-53DA-480A-8511-F26A5993BBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_statistics_services:14.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E86CD4-74B8-452C-AB07-1056D88EBA69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_statistics_services:14.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1FE621F-3100-40F2-B5CA-586CC399BF0D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:*:*:*:*:server:*:*:*",
              "matchCriteriaId": "AFDC8DE8-CA02-403D-ACC9-AAFD83931EF4",
              "versionEndExcluding": "1.17.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.18.0:*:*:*:server:*:*:*",
              "matchCriteriaId": "8C8006F5-94D2-41AD-971E-3E4949AB3E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.19.0:*:*:*:server:*:*:*",
              "matchCriteriaId": "D4F950F4-8EBB-49BF-A04F-1FC53ADF5B37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.20.0:*:*:*:server:*:*:*",
              "matchCriteriaId": "1DDF81DF-0B5D-47B0-95CA-99FE80193632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.21.0:*:*:*:server:*:*:*",
              "matchCriteriaId": "470B940C-EC98-48AC-A723-6E7358355A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_enterprise_runtime_for_r:1.21.1:*:*:*:server:*:*:*",
              "matchCriteriaId": "CE050D37-B646-4A65-A580-D2AEFB024216",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1159D5C-5687-4634-8372-2D78E3AC4EED",
              "versionEndExcluding": "14.0.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:14.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4B3273-A4D0-4455-9957-3FB21273E509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:14.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "482923B8-BF2E-4EB1-A04A-BF139703DA49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:14.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCF8F9F1-2DE8-4ABB-BC5E-C75D81ACA0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:14.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "362FBA49-9BEA-4946-9F64-0E5FB57B8AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:14.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC54B56-2861-404F-91F5-2FC9C2B6F794",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9B3AD9-1370-43F5-82FF-D62FE7EB14BB",
              "versionEndExcluding": "14.0.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:14.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5F5802-BBC6-41E6-BB6A-FB58C0806C18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:14.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0760EB3A-55CD-4F7C-A60B-9A2B01A7D7AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:14.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAFACCD8-2FD1-4759-93A4-91798A1D5E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:14.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60D8880-17CA-425D-B4A4-42F67DF59E67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:14.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0429550-AC79-489D-9D21-C2E0CF5F68DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E73759-DAA6-4426-BCCC-3C430F24B58B",
              "versionEndExcluding": "14.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:*:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "3D1EB109-FC21-404F-8129-73A5363B5A94",
              "versionEndExcluding": "14.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidades de inyecci\u00f3n: Los atacantes pueden inyectar c\u00f3digo malicioso, lo que podr\u00eda permitirle controlar el sistema que ejecuta estas funciones. Adem\u00e1s, una validaci\u00f3n insuficiente de los nombres de archivo durante la carga puede permitir que los atacantes carguen y ejecuten archivos maliciosos, lo que provoca la ejecuci\u00f3n de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2025-3115",
  "lastModified": "2025-11-11T12:15:34.360",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 9.4,
          "baseSeverity": "CRITICAL",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "HIGH",
          "subConfidentialityImpact": "HIGH",
          "subIntegrityImpact": "HIGH",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@tibco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-09T18:15:50.813",
  "references": [
    {
      "source": "security@tibco.com",
      "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3115-r3485/"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2023-26221

Vulnerability from fkie_nvd - Published: 2023-11-08 20:15 - Updated: 2024-11-21 07:50
Summary
The Spotfire Connectors component of TIBCO Software Inc.'s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "949054A7-A299-4C11-9E2B-7437D6C4D801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C63E85E6-8519-4957-B55B-0B8F6E658B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE433F55-79E4-438C-81C7-4CEEAEE1C442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:12.5.0:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "55B9367D-3938-4059-BABE-72322C2AE10C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7F5C30-950E-4483-8795-761C506BB549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B67F529-EB21-4628-ADA2-56E76DA272EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "889EE133-0CEE-429F-A58E-1F310FB981B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Spotfire Connectors component of TIBCO Software Inc.\u0027s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.\n\n"
    },
    {
      "lang": "es",
      "value": "El componente Spotfire Connectors de Spotfire Analyst, Spotfire Server y Spotfire para AWS Marketplace de TIBCO Software Inc. contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante con pocos privilegios y acceso de lectura/escritura crear archivos maliciosos de Analyst. Un ataque exitoso que utilice esta vulnerabilidad requiere la interacci\u00f3n humana de una persona distinta del atacante. Las versiones afectadas son Spotfire Analyst de TIBCO Software Inc.: versiones 12.3.0, 12.4.0 y 12.5.0, Spotfire Server: versiones 12.3.0, 12.4.0 y 12.5.0, y Spotfire para AWS Marketplace: versi\u00f3n 12.5.0."
    }
  ],
  "id": "CVE-2023-26221",
  "lastModified": "2024-11-21T07:50:56.717",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.7,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.9,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-08T20:15:07.313",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/services/support/advisories"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "security@tibco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-26220

Vulnerability from fkie_nvd - Published: 2023-10-10 23:15 - Updated: 2024-11-21 07:50
Summary
The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "841BE5EF-AA80-4864-8379-572F84D01CB1",
              "versionEndIncluding": "11.4.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6643BEFC-4C34-4D82-9451-79F2E2727230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98448711-785E-483A-BC6A-5A5311C7FF63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CB9F167-A6FF-46ED-9BCB-F4634ACB18B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3122E8-7D53-4FE6-A38F-39ED821BC8BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F5049F-F75D-45A3-A6A3-E22353721532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F029AC1D-CB5B-4F2B-B255-EB98F7758232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AD66F3D-4B7D-4C0A-A3DE-69C4A0D2B480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F07C385A-55C6-4B35-9D1A-058958571530",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1CF7CAF-77B3-4FB8-AD50-E74999A5306E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D671E2F-D211-4E0D-B351-92A08327E439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD0A72BA-11DB-494E-9FBA-415253D878BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A54F9B1-432F-4BDF-8331-710EB7DC7DA0",
              "versionEndIncluding": "11.4.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50269188-015E-406A-90B8-5F113773A3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBDD97C0-212A-4E53-9246-65ED746C6554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E22936E-ADBE-4D1F-AB3E-574DDE9B26E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EF8AB2-09E0-4235-B7A2-41867303ACA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2838D095-0DA8-4F1B-BAD4-D5A326C5D65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "014E0C2D-6601-478E-A5EF-D14789430A31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5854EC01-743F-4B31-B51F-34DE3F4DDCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "113FBC40-777B-4B99-A5BF-A40F6707AFD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "117AF754-4972-4254-A158-37B87C054DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7619EE98-BAFF-4685-B434-4CD2966D6C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7487265D-177D-40E5-8BBA-54224B9FFC96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7722AC4-9856-403E-92A9-5CD0CFA57CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A18039B-1EF0-4617-9579-509E611FA859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB4CDB7-3FA6-4441-94F6-CEA13BD8C811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8D46B2-D8C9-4FF9-A6FA-61B755241B12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8466B949-D760-46C3-BC9B-11489DA9773F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Spotfire Library component of TIBCO Software Inc.\u0027s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\n\n"
    },
    {
      "lang": "es",
      "value": "El componente Spotfire Library de Spotfire Analyst y Spotfire Server de TIBCO Software Inc. contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante con pocos privilegios y acceso a la red ejecutar Cross Site Scripting (XSS) almacenado en el sistema afectado. Un ataque exitoso que utilice esta vulnerabilidad requiere la interacci\u00f3n humana de una persona distinta del atacante. Las versiones afectadas son Spotfire Analyst de TIBCO Software Inc.: versiones 11.4.7 e inferiores, versiones 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0. 3 y 12.0.4, versiones 12.1.0 y 12.1.1 y Spotfire Server: versiones 11.4.11 y anteriores, versiones 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0 , 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4 y 12.0.5, versiones 12.1.0 y 12.1.1."
    }
  ],
  "id": "CVE-2023-26220",
  "lastModified": "2024-11-21T07:50:56.580",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-10T23:15:09.933",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/services/support/advisories"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@tibco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-41558

Vulnerability from fkie_nvd - Published: 2022-11-15 19:15 - Updated: 2025-04-29 21:15
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37C458AE-DF6D-4A9D-8954-9F9A746EA153",
              "versionEndIncluding": "11.4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6643BEFC-4C34-4D82-9451-79F2E2727230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98448711-785E-483A-BC6A-5A5311C7FF63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CB9F167-A6FF-46ED-9BCB-F4634ACB18B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3122E8-7D53-4FE6-A38F-39ED821BC8BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F5049F-F75D-45A3-A6A3-E22353721532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F029AC1D-CB5B-4F2B-B255-EB98F7758232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D671E2F-D211-4E0D-B351-92A08327E439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:*:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "97136A36-0254-4B1A-8132-349EB8279258",
              "versionEndIncluding": "12.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A05C189-5144-4A7B-8EB4-587E4D9154FE",
              "versionEndIncluding": "11.4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D2B72E-FD8D-4B3D-8DE7-BE80FCD36F91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE7FF297-7538-4692-9870-8715F9D22BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1D2B69-5F93-48F2-8928-AD74354C488C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45724495-A8C3-45FA-988D-AB43174C1C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:12.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC2BEA33-539C-455A-9199-F39B101CA25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:12.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "019F4B98-5C77-4EC3-830B-DF29D7E0B833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:12.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BB5140-FC8B-4C2B-A69D-F7BF5A2E7392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B00BABD-914D-4653-8607-E0EB4D9FE251",
              "versionEndIncluding": "11.4.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "50269188-015E-406A-90B8-5F113773A3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBDD97C0-212A-4E53-9246-65ED746C6554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E22936E-ADBE-4D1F-AB3E-574DDE9B26E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EF8AB2-09E0-4235-B7A2-41867303ACA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2838D095-0DA8-4F1B-BAD4-D5A326C5D65C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "014E0C2D-6601-478E-A5EF-D14789430A31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5854EC01-743F-4B31-B51F-34DE3F4DDCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "113FBC40-777B-4B99-A5BF-A40F6707AFD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "117AF754-4972-4254-A158-37B87C054DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7619EE98-BAFF-4685-B434-4CD2966D6C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:12.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE8D46B2-D8C9-4FF9-A6FA-61B755241B12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0."
    },
    {
      "lang": "es",
      "value": "El componente de visualizaciones de TIBCO Spotfire Analyst de TIBCO Software Inc., TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform para AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, y TIBCO Spotfire Server contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante con pocos privilegios y acceso a la red ejecutar Cross Site Scripting (XSS) Almacenado en el sistema afectado. Un ataque exitoso que utilice esta vulnerabilidad requiere la interacci\u00f3n humana de una persona distinta del atacante. Las versiones afectadas son:\nTIBCO Spotfire Analyst de TIBCO Software Inc.: versiones 11.4.4 e inferiores, \nTIBCO Spotfire Analyst: versiones 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0 y 12.0.1. \nTIBCO Spotfire Analyst: versi\u00f3n 12.1.0, \nTIBCO Spotfire Analytics Platform para AWS Marketplace: versiones 12.1.0 y anteriores, \nTIBCO Spotfire Desktop: versiones 11.4.4 y anteriores, \nTIBCO Spotfire Desktop: versiones 11.5.0, 11.6.0, 11.7. 0, 11.8.0, 12.0.0 y 12.0.1, \nTIBCO Spotfire Desktop: versi\u00f3n 12.1.0, \nTIBCO Spotfire Server: versiones 11.4.8 y anteriores, \nTIBCO Spotfire Server: versiones 11.5.0, 11.6.0, 11.6. 1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0 y 12.0.1, \ny TIBCO Spotfire Server: versi\u00f3n 12.1.0."
    }
  ],
  "id": "CVE-2022-41558",
  "lastModified": "2025-04-29T21:15:48.637",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T19:15:36.153",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/services/support/advisories"
    },
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2021-23273

Vulnerability from fkie_nvd - Published: 2021-03-09 21:15 - Updated: 2024-11-21 05:51
Summary
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:analytics_platform:*:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "5AEB1299-AD20-4B5A-AD92-E2BD4AB0BD61",
              "versionEndIncluding": "11.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EECB41F-9602-41C6-89AD-3567CCE6CD84",
              "versionEndIncluding": "10.3.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "529B7D1D-3734-433F-87FF-EED082378421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F102050-55D2-4DCC-AEA2-7EEF4042B23E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EC965E0-2B80-420F-AE1D-F68B4DB6C314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2802ABF7-E503-4FBF-A8C1-D78DC167FB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE461AE-B840-41A1-BD45-75408316EFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5FEF12-1AF5-43FB-96CF-074FED42BDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B50563-341C-498B-85DB-A564DC4787EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16029A99-9B9C-4006-8314-67C8731BDCE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71D20203-4F5A-48AE-A3C9-517B94A9F596",
              "versionEndIncluding": "10.3.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D5AFBD-DD57-4744-BB81-0ABBDBDE0171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DEF011-D075-44CE-8D5B-E85562360E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D25CEF2-A066-44B0-AE48-26C39A0A7507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4399AF82-5A89-4DC0-866B-B70D21CE5C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E01304-336B-4E87-8122-570DE139E06E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ED0B9D-699F-476A-AEFD-2CE5B8CA1C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F866EB-F423-4491-951D-AF0A6681683A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04347EE2-37C4-44EC-A533-9518E793C15F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2F12D0-C533-49FA-84D8-3333DDD097A4",
              "versionEndIncluding": "10.3.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "28151CD2-540D-4D16-A894-082C2946FEF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "901B6B29-8644-43BC-BFAD-3229CD37FB9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1490724A-AF67-4037-B5D9-47477B58D765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A962BD2-0CB0-4EE5-9904-362FDB9655D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA54B6E-D53B-4196-AAD4-1C551C635D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "047CA6DF-7CF2-4B6F-BDFD-DB1EC64D6C1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F5F724C-30A5-4BA3-9047-3B0DFE30B4BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA297F15-2B70-4A13-9D63-816FD3149A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "58D5C32A-F10F-4237-99BB-163B4B7D6D1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:11.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B68BAB9A-2479-4C36-B12A-D9F5A6C98D0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0."
    },
    {
      "lang": "es",
      "value": "El componente del cliente Spotfire de TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform para AWS Marketplace, TIBCO Spotfire Desktop y TIBCO Spotfire Server, de TIBCO Software Inc, contiene una vulnerabilidad que te\u00f3ricamente permite a un atacante con pocos privilegios y acceso a la red ejecutar un ataque de tipo Cross Site Scripting (XSS) almacenado en el sistema afectado.\u0026#xa0;Un ataque exitoso que utilice esta vulnerabilidad requiere la interacci\u00f3n humana de una persona que no sea el atacante.\u0026#xa0;Las versiones afectadas son TIBCO Spotfire Analyst de TIBCO Software Inc.: versiones 10.3.3 y anteriores, versiones 10.10.0, 10.10.1 y 10.10.2, versiones 10.7.0, 10.8.0, 10.9.0, 11.0.0 y 11.1.0, TIBCO Spotfire Analytics Platform para AWS Marketplace: versiones 11.1.0 y anteriores, TIBCO Spotfire Desktop: versiones 10.3.3 y anteriores, versiones 10.10.0, 10.10.1 y 10.10.2, versiones 10.7.0 , 10.8.0, 10.9.0, 11.0.0 y 11.1.0, y TIBCO Spotfire Server: versiones 10.3.11 y anteriores, versiones 10.10.0, 10.10.1, 10.10.2 y 10.10.3, versiones 10.7 .0, 10.8.0, 10.8.1, 10.9.0, 11.0.0 y 11.1.0"
    }
  ],
  "id": "CVE-2021-23273",
  "lastModified": "2024-11-21T05:51:28.673",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 5.9,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-09T21:15:14.640",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-9416

Vulnerability from fkie_nvd - Published: 2020-09-15 19:15 - Updated: 2024-11-21 05:40
Summary
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "529B7D1D-3734-433F-87FF-EED082378421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F102050-55D2-4DCC-AEA2-7EEF4042B23E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EC965E0-2B80-420F-AE1D-F68B4DB6C314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2802ABF7-E503-4FBF-A8C1-D78DC167FB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:10.7.0:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "F3495FF5-8541-4E0B-915C-1642D40009F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:10.8.0:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "890B1AAF-3AFF-406C-858A-8B93F1513D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:10.8.1:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "EC56F0DD-46EF-44A2-8CBD-BE04784A4070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:10.9.0:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "4B25A257-59C6-4A8C-ADFB-9812A99450AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:10.10.0:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "1AF24EBE-7A00-4BA3-ABCC-F1806FABFB97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform:10.10.1:*:*:*:*:aws_marketplace:*:*",
              "matchCriteriaId": "5C45EC10-874A-44F1-BFB0-FC657BDDFDAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D5AFBD-DD57-4744-BB81-0ABBDBDE0171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DEF011-D075-44CE-8D5B-E85562360E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D25CEF2-A066-44B0-AE48-26C39A0A7507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4399AF82-5A89-4DC0-866B-B70D21CE5C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "28151CD2-540D-4D16-A894-082C2946FEF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "901B6B29-8644-43BC-BFAD-3229CD37FB9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1490724A-AF67-4037-B5D9-47477B58D765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A962BD2-0CB0-4EE5-9904-362FDB9655D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA54B6E-D53B-4196-AAD4-1C551C635D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_server:10.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "047CA6DF-7CF2-4B6F-BDFD-DB1EC64D6C1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1."
    },
    {
      "lang": "es",
      "value": "El componente cliente Spotfire de TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform para AWS Marketplace, TIBCO Spotfire Desktop y TIBCO Spotfire Server; de TIBCO Software Inc, contiene una vulnerabilidad que te\u00f3ricamente permite a un usuario leg\u00edtimo inyectar scripts.\u0026#xa0;Si los ejecuta una v\u00edctima autenticada en el sistema afectado, estos scripts ser\u00e1n ejecutados  con los privilegios de la v\u00edctima.\u0026#xa0;Las versiones afectadas son TIBCO Spotfire Analyst: versiones 10.7.0, 10.8.0, 10.9.0 y 10.10.0, TIBCO Spotfire Analytics Platform para AWS Marketplace: versiones 10.7.0, 10.8.0, 10.8. 1, 10.9.0, 10.10.0 y 10.10.1, TIBCO Spotfire Desktop: versiones 10.7.0, 10.8.0, 10.9.0 y 10.10.0, y TIBCO Spotfire Server: versiones 10.7.0, 10.8.0 , 10.8.1, 10.9.0, 10.10.0 y 10.10.1; de TIBCO Software Inc"
    }
  ],
  "id": "CVE-2020-9416",
  "lastModified": "2024-11-21T05:40:35.917",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 5.3,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-09-15T19:15:13.370",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2019-17334

Vulnerability from fkie_nvd - Published: 2019-12-17 21:15 - Updated: 2024-11-21 04:32
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB894D2-BCDB-4E0A-AA7B-4ACA4B8A1E4A",
              "versionEndIncluding": "7.11.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BBF9F4-E29A-43DE-9B82-38FEBDFDE18F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F18028-5359-4EAE-82AE-A9A0E9E95EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "90A36A15-5120-4C99-ABA0-29948879FF0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D625F1E-33A1-4A6D-A4A1-1BEF11633B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAC070A8-515C-4BFC-8777-C5C56A275018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81DE3A2-30BB-455A-ACD3-CDEBAEE9DBD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF65A903-2AF8-4A12-93F8-5645EA280808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C4BDDBE-3B8C-42E7-AA9B-0B166D807AE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "218EEDC3-9F1A-49A7-9ABA-6006AB0E5586",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15EAA93-A037-4AA9-908A-3478E701CB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A1E671-2901-409C-9A34-234A401241A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "74725E74-1940-4DD4-ABC2-C417CE911A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB885AA-2B0C-4CF1-9CFE-2EE31548D579",
              "versionEndIncluding": "7.11.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "712FA45A-A06A-40EB-9D4E-2F13AF2FFC05",
              "versionEndIncluding": "7.11.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C712D60-282E-4CB5-A6B3-2E8AB3D17C44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B99EE75F-9D35-43EA-A53C-1E792EAF640A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EB4DC3F-3F2F-4231-9A17-174C21E5634F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5F4A7F-EF07-40FE-91EE-750090857746",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D8636D-13A4-4A6E-B946-120C4EA3BC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E56F19A5-E482-4DF0-8533-54602A2C482D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F932843-60C6-437D-81D5-8BAD642B0CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A497AD-F1A8-42DB-954A-FF0F9F309013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C0D79B-B880-4D70-8FF5-2B04B082A8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "670A2ACC-EAEC-40B3-A47A-74871204A711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F288EDE4-5EA5-4B58-A113-FFDF68A70461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F34C58D-DF67-4EDF-A27E-004248FB36A5",
              "versionEndIncluding": "7.11.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
    },
    {
      "lang": "es",
      "value": "El componente Visualizations de TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform para AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, y TIBCO Spotfire Desktop Language Packs, contiene una vulnerabilidad que te\u00f3ricamente permite a un atacante, con permiso para escribir archivos DXP en la biblioteca de Spotfire, ejecutar c\u00f3digo remotamente de su elecci\u00f3n en la cuenta de usuario de otros usuarios que acceden al sistema afectado. Este ataque es un riesgo solo cuando el atacante tiene acceso de escritura a un sistema de archivos de red compartido con el sistema afectado. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versiones 7.11.1 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3 .1 y 10.3.2, versiones 10.4.0, 10.5.0 y 10.6.0, TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\u00f3n 10.6.0, TIBCO Spotfire Deployment Kit: versiones 7.11.1 y por debajo, TIBCO Spotfire Desktop : versiones 7.11.1 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1 y 10.3.2, versiones 10.4.0, 10.5.0 y 10.6.0, y TIBCO Spotfire Desktop Language Packs: versiones 7.11.1 y por debajo."
    }
  ],
  "id": "CVE-2019-17334",
  "lastModified": "2024-11-21T04:32:06.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 6.0,
        "source": "security@tibco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-17T21:15:12.097",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2017-3180

Vulnerability from fkie_nvd - Published: 2018-07-24 15:29 - Updated: 2024-11-21 03:24
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_web_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "173CF2F8-3802-4D0B-B825-518F22753246",
              "versionEndIncluding": "2.1.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CA67C3-1E04-4CF9-9DBF-5AAC32ED1BAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DE259A9-18D9-48D2-B1DF-E9244F6C79B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD36D84-B44B-48AA-9FD0-966DFBE5CFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648B466E-6DDA-4A8E-BCD1-60A50B8E7680",
              "versionEndIncluding": "7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB0628A-9C75-4196-A28C-7C1B1A116C53",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0424905D-696E-4D5F-957E-9D360F03E296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA7ABF1-F6DE-4908-9C09-8B523FD317A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE55C07-E141-4DEA-A9E2-B075E1F56449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27A296C-6D4A-405B-86BB-F7D383C656E8",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050885E-62BF-454F-A653-129269829390",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA0A8EB-9A3B-415F-9823-50C4AAD4C9AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F2A9DC-8D5F-4516-8581-0A719FEAC867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADE970A-E3D6-41AC-A3E6-9F49090A0445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E31011-0D3C-4339-86F0-81CD77BC3439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC24CB8-3411-438A-A99C-5DC0DD4A3128",
              "versionEndIncluding": "6.5.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "981372F8-3050-42BA-BF94-16478E4B04A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A19D3881-3807-4EB0-B07E-116393FAA836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "584E8D2D-E0D9-4886-81D4-B2A629884F34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12851913-2BAF-4B35-AD03-7C6B4A91C43E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF48FC-2634-4D66-8BD2-CB6D3CA04C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*",
              "matchCriteriaId": "CA0557E9-5277-4D60-A1C6-1DC24FD7ECE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894B719-865C-4EB3-B0E8-6853F1BC31A8",
              "versionEndIncluding": "7.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26FF0F0-3126-4AF6-A1FA-C911FB429648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4FF6CF3-B05C-4014-83F5-3C44D09F4FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D9DCB1-D307-42D0-A5CB-904D5DCCCD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF9238B-B335-4AC3-A866-A25D708CBE93",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D883BEDD-2A54-4D01-8322-E7804D1D057A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE1B65E-1DAF-43A4-B5AC-956ABA66A078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9D754F3-9358-4163-9999-23AB931AA790",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C96AC0E-4C68-4CDD-A73F-3B19D2EEFE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1959D810-72DC-4B6A-8BD9-6B80C49A5315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
    },
    {
      "lang": "es",
      "value": "M\u00faltiples productos TIBCO son propensos a m\u00faltiples vulnerabilidades sin especificar de Cross-Site Scripting (XSS) debido a que fracasan a la hora de sanear entradas proporcionadas por el usuario. Un atacante podr\u00eda aprovechar estos problemas para ejecutar c\u00f3digo script arbitrario en el navegador de un usuario incauto en el contexto del sitio afectado. Esto puede permitir que el atacante robe credenciales de autenticaci\u00f3n basadas en cookies y lance otros ataques. Los productos y versiones afectadas incluyen: TIBCO Silver Fabric Enabler for Spotfire Web Player en versiones 2.1.2 y anteriores; TIBCO Spotfire Analyst 7.5.0; TIBCO Spotfire Analyst 7.6.0; TIBCO Spotfire Analyst 7.7.0; TIBCO Spotfire Analytics Platform for AWS Marketplace en versiones 7.0.2 y anteriores; TIBCO Spotfire Automation Services en versiones 6.5.3 y anteriores; TIBCO Spotfire Automation Services 7.0.0 y 7.0.1; TIBCO Spotfire Connectors 7.6.0; TIBCO Spotfire Deployment Kit en versiones 6.5.3 y anteriores; TIBCO Spotfire Deployment Kit 7.0.0 y 7.0.1; TIBCO Spotfire Deployment Kit 7.5.0; TIBCO Spotfire Deployment Kit 7.6.0; TIBCO Spotfire Deployment Kit 7.7.0; TIBCO Spotfire Desktop en versiones 6.5.2 y anteriores; TIBCO Spotfire Desktop 7.0.0 y 7.0.1; TIBCO Spotfire Desktop 7.5.0; TIBCO Spotfire Desktop 7.6.0; TIBCO Spotfire Desktop 7.7.0; TIBCO Spotfire Desktop Developer Edition 7.7.0; TIBCO Spotfire Desktop Language Packs en versiones 7.0.1 y anteriores; TIBCO Spotfire Desktop Language Packs 7.5.0; TIBCO Spotfire Desktop Language Packs 7.6.0; TIBCO Spotfire Desktop Language Packs 7.7.0; TIBCO Spotfire Professional en versiones 6.5.3 y anteriores; TIBCO Spotfire Professional 7.0.0 y 7.0.1 TIBCO Spotfire Web Player en versiones 6.5.3 y anteriores; y TIBCO Spotfire Web Player 7.0.0 y 7.0.1."
    }
  ],
  "id": "CVE-2017-3180",
  "lastModified": "2024-11-21T03:24:58.687",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-24T15:29:00.327",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/bid/95699"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/bid/95699"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2017-3181

Vulnerability from fkie_nvd - Published: 2018-07-24 15:29 - Updated: 2024-11-21 03:24
Severity ?
Summary
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD36D84-B44B-48AA-9FD0-966DFBE5CFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_client:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E5094B-61AD-4DF2-A3FF-4BCE872B4032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE55C07-E141-4DEA-A9E2-B075E1F56449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E31011-0D3C-4339-86F0-81CD77BC3439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12851913-2BAF-4B35-AD03-7C6B4A91C43E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF48FC-2634-4D66-8BD2-CB6D3CA04C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*",
              "matchCriteriaId": "CA0557E9-5277-4D60-A1C6-1DC24FD7ECE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4FF6CF3-B05C-4014-83F5-3C44D09F4FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D9DCB1-D307-42D0-A5CB-904D5DCCCD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player_client:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E2BBAD2-C1EB-4698-A598-1AF7A58B94D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
    },
    {
      "lang": "es",
      "value": "M\u00faltiples productos TIBCO son propensos a m\u00faltiples vulnerabilidades sin especificar de inyecci\u00f3n SQL debido a que fracasan a la hora de sanear entradas proporcionadas por el usuario antes de emplearlas en una consulta SQL. La explotaci\u00f3n de estos problemas podr\u00eda permitir que un atacante comprometa la aplicaci\u00f3n, acceda o modifique datos o explote vulnerabilidades latentes en la base de datos subyacente. Los siguientes productos y versiones se han visto afectados: TIBCO Spotfire Analyst 7.7.0; TIBCO Spotfire Connectors 7.6.0; TIBCO Spotfire Deployment Kit 7.7.0; TIBCO Spotfire Desktop 7.6.0; TIBCO Spotfire Desktop 7.7.0; TIBCO Spotfire Desktop Developer Edition 7.7.0; TIBCO Spotfire Desktop Language Packs 7.6.0; y TIBCO Spotfire Desktop Language Packs 7.7.0. Los siguientes componentes se han visto afectados: TIBCO Spotfire Client y TIBCO Spotfire Web Player Client."
    }
  ],
  "id": "CVE-2017-3181",
  "lastModified": "2024-11-21T03:24:58.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-24T15:29:00.373",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/bid/95696"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/bid/95696"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2018-5435

Vulnerability from fkie_nvd - Published: 2018-06-27 16:29 - Updated: 2024-11-21 04:08
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
Impacted products
Vendor Product Version
tibco spotfire_analyst *
tibco spotfire_analyst 7.9.0
tibco spotfire_analyst 7.9.1
tibco spotfire_analyst 7.10.0
tibco spotfire_analyst 7.10.1
tibco spotfire_analyst 7.11.0
tibco spotfire_analyst 7.12.0
tibco spotfire_analytics_platform_for_aws *
tibco spotfire_deployment_kit *
tibco spotfire_deployment_kit 7.9.0
tibco spotfire_deployment_kit 7.9.1
tibco spotfire_deployment_kit 7.10.0
tibco spotfire_deployment_kit 7.10.1
tibco spotfire_deployment_kit 7.11.0
tibco spotfire_deployment_kit 7.12.0
tibco spotfire_desktop *
tibco spotfire_desktop 7.9.0
tibco spotfire_desktop 7.9.1
tibco spotfire_desktop 7.10.0
tibco spotfire_desktop 7.10.1
tibco spotfire_desktop 7.11.0
tibco spotfire_desktop 7.12.0
tibco spotfire_desktop_language_packs *
tibco spotfire_desktop_language_packs 7.9.0
tibco spotfire_desktop_language_packs 7.9.1
tibco spotfire_desktop_language_packs 7.10.0
tibco spotfire_desktop_language_packs 7.10.1
tibco spotfire_desktop_language_packs 7.11.0
tibco spotfire_analyst *
tibco spotfire_analyst 7.9.0
tibco spotfire_analyst 7.9.1
tibco spotfire_analyst 7.10.0
tibco spotfire_analyst 7.10.1
tibco spotfire_analyst 7.11.0
tibco spotfire_analyst 7.12.0
tibco spotfire_analytics_platform_for_aws *
tibco spotfire_deployment_kit *
tibco spotfire_deployment_kit 7.9.0
tibco spotfire_deployment_kit 7.9.1
tibco spotfire_deployment_kit 7.10.0
tibco spotfire_deployment_kit 7.10.1
tibco spotfire_deployment_kit 7.11.0
tibco spotfire_deployment_kit 7.12.0
tibco spotfire_desktop *
tibco spotfire_desktop 7.9.0
tibco spotfire_desktop 7.9.1
tibco spotfire_desktop 7.10.0
tibco spotfire_desktop 7.10.1
tibco spotfire_desktop 7.11.0
tibco spotfire_desktop 7.12.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10715379-262A-4BF6-81C1-E83EDFD0997D",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F156A08E-4322-4709-AB55-729DD88750C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1D9BA58-24CC-49B0-9AAC-B5282739148F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A523064-C669-4E54-8144-028E67B9E101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7860A0-9D92-4A36-82EE-652D259C82CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "807C6E14-4BA0-451D-BD58-60EA49693B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EB5484-D457-4782-B573-874F81C5706B",
              "versionEndIncluding": "7.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339756F-D9E7-4C81-902B-A89508751623",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FD8E7-1D94-487A-9969-C2A24EB0B0CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1202BCD2-88B8-4C01-B847-0B62395C9E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8CE0D2-2BD8-43D6-AEC6-0FF8A0172D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B4E3F39-B72D-4E61-B7A8-B0A9058615B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7AA90E0-E644-4D57-94F8-D3CE47259286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B8CBAA0-9B0D-4C16-A9AD-4DD94D70E979",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2A8693-7280-438B-A8C4-CA8FCB81BEEB",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "242536E9-B5D5-4C28-AC6C-367E596B042E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "151FA030-E1DC-4557-A796-0F700D0FE322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "941B4BFF-B9C0-49E8-9799-EA3C607DC2EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4FACDF7-464C-45D7-9C52-C773DDFEB695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD0D0AA-B286-4494-B55C-C46B9C7DA373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C93DB13-7E0B-4260-875F-8EC71BA10E4B",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6DB39B-3E4D-4BFB-8232-72EA87C7D156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC33387-D15B-4C9A-86E1-2E0A0B490B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21E52981-102A-4F56-BBE1-328FF63CD05F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD9867D-EEF9-4228-9B2A-06449813DD1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43A6213-F9B4-4CBC-A34D-A67648DE0F54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10715379-262A-4BF6-81C1-E83EDFD0997D",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F156A08E-4322-4709-AB55-729DD88750C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1D9BA58-24CC-49B0-9AAC-B5282739148F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A523064-C669-4E54-8144-028E67B9E101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7860A0-9D92-4A36-82EE-652D259C82CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "807C6E14-4BA0-451D-BD58-60EA49693B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EB5484-D457-4782-B573-874F81C5706B",
              "versionEndIncluding": "7.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339756F-D9E7-4C81-902B-A89508751623",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FD8E7-1D94-487A-9969-C2A24EB0B0CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1202BCD2-88B8-4C01-B847-0B62395C9E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8CE0D2-2BD8-43D6-AEC6-0FF8A0172D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B4E3F39-B72D-4E61-B7A8-B0A9058615B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7AA90E0-E644-4D57-94F8-D3CE47259286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B8CBAA0-9B0D-4C16-A9AD-4DD94D70E979",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2A8693-7280-438B-A8C4-CA8FCB81BEEB",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "242536E9-B5D5-4C28-AC6C-367E596B042E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "151FA030-E1DC-4557-A796-0F700D0FE322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "941B4BFF-B9C0-49E8-9799-EA3C607DC2EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4FACDF7-464C-45D7-9C52-C773DDFEB695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD0D0AA-B286-4494-B55C-C46B9C7DA373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
    },
    {
      "lang": "es",
      "value": "Los componentes TIBCO Spotfire Client y TIBCO Spotfire Web Player Client de TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop y TIBCO Spotfire Desktop Language Packs de TIBCO Software Inc. contienen m\u00faltiples vulnerabilidades que podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo. Las versiones afectadas son TIBCO Spotfire Analyst hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace hasta las versi\u00f3n (inclusive) 7.12.0, TIBCO Spotfire Deployment Kit hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Desktop hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0 y TIBCO Spotfire Desktop Language Pack hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1 y 7.11.0 de TIBCO Software Inc."
    }
  ],
  "id": "CVE-2018-5435",
  "lastModified": "2024-11-21T04:08:47.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-06-27T16:29:00.347",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2018-5437

Vulnerability from fkie_nvd - Published: 2018-06-27 16:29 - Updated: 2024-11-21 04:08
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10715379-262A-4BF6-81C1-E83EDFD0997D",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F156A08E-4322-4709-AB55-729DD88750C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1D9BA58-24CC-49B0-9AAC-B5282739148F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A523064-C669-4E54-8144-028E67B9E101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7860A0-9D92-4A36-82EE-652D259C82CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "807C6E14-4BA0-451D-BD58-60EA49693B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07EB5484-D457-4782-B573-874F81C5706B",
              "versionEndIncluding": "7.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339756F-D9E7-4C81-902B-A89508751623",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FD8E7-1D94-487A-9969-C2A24EB0B0CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1202BCD2-88B8-4C01-B847-0B62395C9E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8CE0D2-2BD8-43D6-AEC6-0FF8A0172D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B4E3F39-B72D-4E61-B7A8-B0A9058615B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7AA90E0-E644-4D57-94F8-D3CE47259286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B8CBAA0-9B0D-4C16-A9AD-4DD94D70E979",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2A8693-7280-438B-A8C4-CA8FCB81BEEB",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "242536E9-B5D5-4C28-AC6C-367E596B042E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "151FA030-E1DC-4557-A796-0F700D0FE322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "941B4BFF-B9C0-49E8-9799-EA3C607DC2EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4FACDF7-464C-45D7-9C52-C773DDFEB695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD0D0AA-B286-4494-B55C-C46B9C7DA373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C93DB13-7E0B-4260-875F-8EC71BA10E4B",
              "versionEndIncluding": "7.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6DB39B-3E4D-4BFB-8232-72EA87C7D156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC33387-D15B-4C9A-86E1-2E0A0B490B6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21E52981-102A-4F56-BBE1-328FF63CD05F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD9867D-EEF9-4228-9B2A-06449813DD1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43A6213-F9B4-4CBC-A34D-A67648DE0F54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
    },
    {
      "lang": "es",
      "value": "Los componentes TIBCO Spotfire Client y TIBCO Spotfire Web Player Client de TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop y TIBCO Spotfire Desktop Language Packs de TIBCO Software Inc. contienen m\u00faltiples vulnerabilidades que podr\u00edan permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n. Las versiones afectadas son TIBCO Spotfire Analyst hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace hasta las versi\u00f3n (inclusive) 7.12.0, TIBCO Spotfire Deployment Kit hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Desktop hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0 y TIBCO Spotfire Desktop Language Pack hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1 y 7.11.0 de TIBCO Software Inc."
    }
  ],
  "id": "CVE-2018-5437",
  "lastModified": "2024-11-21T04:08:48.097",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 4.0,
        "source": "security@tibco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-06-27T16:29:00.443",
  "references": [
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "security@tibco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.tibco.com/services/support/advisories"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
    }
  ],
  "sourceIdentifier": "security@tibco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2025-3115 (GCVE-0-2025-3115)

Vulnerability from cvelistv5 – Published: 2025-04-09 18:12 – Updated: 2025-11-11 11:47
VLAI?
Title
Spotfire Data Function Vulnerability
Summary
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
Impacted products
Vendor Product Version
Spotfire Spotfire Statistics Services Affected: 14 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Analyst Affected: 14.0 , < 14.0.6 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Deployment Kit used in Spotfire Server Affected: 14.0 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Desktop Affected: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire for AWS Marketplace Unknown: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire Enterprise Runtime for R - Server Edition Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 (Patch)
Affected: 1.19.0 (Patch)
Affected: 1.20.0 (Patch)
Affected: 1.21.0 (Patch)
Affected: 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for Python Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for R Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3115",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:28:35.698097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:29:39.691Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Statistics Services",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.6",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Deployment Kit used in Spotfire Server",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Desktop",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "affected",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "unknown",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Enterprise Runtime for R - Server Edition",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.19.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.20.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for Python",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for R",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\n\n\u003cstrong\u003eInjection Vulnerabilities: \u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAttackers can inject malicious code, potentially gaining control over the system executing these functions.\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution\u003c/span\u003e\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution"
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-11T11:47:58.064Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3115-r3485/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Spotfire Data Function Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2025-3115",
    "datePublished": "2025-04-09T18:12:28.348Z",
    "dateReserved": "2025-04-02T10:56:03.148Z",
    "dateUpdated": "2025-11-11T11:47:58.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-26221 (GCVE-0-2023-26221)

Vulnerability from cvelistv5 – Published: 2023-11-08 19:44 – Updated: 2024-09-04 15:46
VLAI?
Title
TIBCO Spotfire Insufficiently Protected Credential vulnerability
Summary
The Spotfire Connectors component of TIBCO Software Inc.'s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.
CWE
  • CWE-522 - Insufficiently Protected Credentials
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. Spotfire Analyst Affected: 12.3.0
Affected: 12.4.0
Affected: 12.5.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:46:23.940Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/services/support/advisories"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26221",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-04T15:46:35.719041Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-04T15:46:47.013Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.3.0"
            },
            {
              "status": "affected",
              "version": "12.4.0"
            },
            {
              "status": "affected",
              "version": "12.5.0"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.3.0"
            },
            {
              "status": "affected",
              "version": "12.4.0"
            },
            {
              "status": "affected",
              "version": "12.5.0"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe Spotfire Connectors component of TIBCO Software Inc.\u0027s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.\u003c/p\u003e"
            }
          ],
          "value": "The Spotfire Connectors component of TIBCO Software Inc.\u0027s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-522",
              "description": "CWE-522 Insufficiently Protected Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-08T19:44:03.634Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://www.tibco.com/services/support/advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eTIBCO has released updated versions of the affected components which address these issues.\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\u003c/p\u003e\u003cp\u003eSpotfire for AWS Marketplace version 12.5.0: update to version 14.0.0 or later\u003c/p\u003e"
            }
          ],
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nSpotfire Analyst versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\n\nSpotfire Server versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\n\nSpotfire for AWS Marketplace version 12.5.0: update to version 14.0.0 or later\n\n"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Insufficiently Protected Credential vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2023-26221",
    "datePublished": "2023-11-08T19:44:03.634Z",
    "dateReserved": "2023-02-20T22:18:23.428Z",
    "dateUpdated": "2024-09-04T15:46:47.013Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26220 (GCVE-0-2023-26220)

Vulnerability from cvelistv5 – Published: 2023-10-10 22:06 – Updated: 2024-09-18 16:14
VLAI?
Title
TIBCO Spotfire Stored Cross-site Scripting (XSS) vulnerability
Summary
The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. Spotfire Analyst Affected: 0 , ≤ 11.4.7 (semver)
Affected: 11.5.0
Affected: 11.6.0
Affected: 11.7.0
Affected: 11.8.0
Affected: 12.0.0
Affected: 12.0.1
Affected: 12.0.2
Affected: 12.0.3
Affected: 12.0.4
Affected: 12.1.0
Affected: 12.1.1
Create a notification for this product.
    TIBCO Software Inc. Spotfire Server Affected: 0 , ≤ 11.4.11 (semver)
Affected: 11.5.0
Affected: 11.6.0
Affected: 11.6.1
Affected: 11.6.2
Affected: 11.6.3
Affected: 11.7.0
Affected: 11.8.0
Affected: 11.8.1
Affected: 12.0.0
Affected: 12.0.1
Affected: 12.0.2
Affected: 12.0.3
Affected: 12.0.4
Affected: 12.0.5
Affected: 12.1.0
Affected: 12.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:46:24.112Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/services/support/advisories"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26220",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-18T16:14:40.488828Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-18T16:14:49.914Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.7",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            },
            {
              "status": "affected",
              "version": "12.0.2"
            },
            {
              "status": "affected",
              "version": "12.0.3"
            },
            {
              "status": "affected",
              "version": "12.0.4"
            },
            {
              "status": "affected",
              "version": "12.1.0"
            },
            {
              "status": "affected",
              "version": "12.1.1"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.6.1"
            },
            {
              "status": "affected",
              "version": "11.6.2"
            },
            {
              "status": "affected",
              "version": "11.6.3"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "11.8.1"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            },
            {
              "status": "affected",
              "version": "12.0.2"
            },
            {
              "status": "affected",
              "version": "12.0.3"
            },
            {
              "status": "affected",
              "version": "12.0.4"
            },
            {
              "status": "affected",
              "version": "12.0.5"
            },
            {
              "status": "affected",
              "version": "12.1.0"
            },
            {
              "status": "affected",
              "version": "12.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe Spotfire Library component of TIBCO Software Inc.\u0027s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\u003c/p\u003e"
            }
          ],
          "value": "The Spotfire Library component of TIBCO Software Inc.\u0027s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-10T22:06:36.002Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://www.tibco.com/services/support/advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eTIBCO has released updated versions of the affected components which address these issues.\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or later\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4: update to version 12.0.5 or later\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 11.4.11 and below: update to version 11.4.12 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5: update to version 12.0.6 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\u003c/p\u003e"
            }
          ],
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nSpotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or later\n\nSpotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4: update to version 12.0.5 or later\n\nSpotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\n\nSpotfire Server versions 11.4.11 and below: update to version 11.4.12 or later\n\nSpotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5: update to version 12.0.6 or later\n\nSpotfire Server versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\n\n"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "TIBCO Spotfire Stored Cross-site Scripting (XSS) vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2023-26220",
    "datePublished": "2023-10-10T22:06:36.002Z",
    "dateReserved": "2023-02-20T22:18:23.427Z",
    "dateUpdated": "2024-09-18T16:14:49.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-41558 (GCVE-0-2022-41558)

Vulnerability from cvelistv5 – Published: 2022-11-15 18:15 – Updated: 2025-04-29 20:08
VLAI?
Title
TIBCO Spotfire Stored Cross Site Scripting (XSS) Vulnerability
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0.
CWE
  • Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 11.4.4 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analyst Affected: 11.5.0
Affected: 11.6.0
Affected: 11.7.0
Affected: 11.8.0
Affected: 12.0.0
Affected: 12.0.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analyst Affected: 12.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: unspecified , ≤ 12.1.0 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 11.4.4 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: 11.5.0
Affected: 11.6.0
Affected: 11.7.0
Affected: 11.8.0
Affected: 12.0.0
Affected: 12.0.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: 12.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: unspecified , ≤ 11.4.8 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: 11.5.0
Affected: 11.6.0
Affected: 11.6.1
Affected: 11.6.2
Affected: 11.6.3
Affected: 11.7.0
Affected: 11.8.0
Affected: 11.8.1
Affected: 12.0.0
Affected: 12.0.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: 12.1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:42:46.398Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-41558",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-29T20:08:19.885043Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T20:08:32.390Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "12.1.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.8",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.6.1"
            },
            {
              "status": "affected",
              "version": "11.6.2"
            },
            {
              "status": "affected",
              "version": "11.6.3"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "11.8.1"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.0"
            }
          ]
        }
      ],
      "datePublic": "2022-11-15T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00.000Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://www.tibco.com/services/support/advisories"
        },
        {
          "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Analyst version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 12.1.0 and below: update to version 12.1.1 or later\nTIBCO Spotfire Desktop versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Desktop versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Desktop version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Server versions 11.4.8 and below: update to version 11.4.9 or later\nTIBCO Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Server version 12.1.0: update to version 12.1.1 or later"
        }
      ],
      "source": {
        "discovery": "Discovery statement"
      },
      "title": "TIBCO Spotfire Stored Cross Site Scripting (XSS) Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2022-41558",
    "datePublished": "2022-11-15T18:15:12.527Z",
    "dateReserved": "2022-09-26T00:00:00.000Z",
    "dateUpdated": "2025-04-29T20:08:32.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-23273 (GCVE-0-2021-23273)

Vulnerability from cvelistv5 – Published: 2021-03-09 20:35 – Updated: 2024-09-16 23:15
VLAI?
Title
TIBCO Spotfire Cross Site Scripting Vulnerability
Summary
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0.
CWE
  • The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 10.3.3 (custom)
Affected: 10.10.0
Affected: 10.10.1
Affected: 10.10.2
Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 11.0.0
Affected: 11.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: unspecified , ≤ 11.1.0 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 10.3.3 (custom)
Affected: 10.10.0
Affected: 10.10.1
Affected: 10.10.2
Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 11.0.0
Affected: 11.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: unspecified , ≤ 10.3.11 (custom)
Affected: 10.10.0
Affected: 10.10.1
Affected: 10.10.2
Affected: 10.10.3
Affected: 10.7.0
Affected: 10.8.0
Affected: 10.8.1
Affected: 10.9.0
Affected: 11.0.0
Affected: 11.1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:55.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "10.3.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            },
            {
              "status": "affected",
              "version": "10.10.2"
            },
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "11.0.0"
            },
            {
              "status": "affected",
              "version": "11.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.1.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "10.3.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            },
            {
              "status": "affected",
              "version": "10.10.2"
            },
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "11.0.0"
            },
            {
              "status": "affected",
              "version": "11.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "10.3.11",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            },
            {
              "status": "affected",
              "version": "10.10.2"
            },
            {
              "status": "affected",
              "version": "10.10.3"
            },
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.8.1"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "11.0.0"
            },
            {
              "status": "affected",
              "version": "11.1.0"
            }
          ]
        }
      ],
      "datePublic": "2021-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-09T21:06:28",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Cross Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2021-03-09T17:00:00Z",
          "ID": "CVE-2021-23273",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Cross Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.3.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.3.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.3.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "CONFIRM",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2021-23273",
    "datePublished": "2021-03-09T20:35:16.543095Z",
    "dateReserved": "2021-01-08T00:00:00",
    "dateUpdated": "2024-09-16T23:15:56.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-9416 (GCVE-0-2020-9416)

Vulnerability from cvelistv5 – Published: 2020-09-15 18:55 – Updated: 2024-09-16 19:20
VLAI?
Title
TIBCO Spotfire Stored Cross Site Scripting Vulnerability
Summary
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1.
CWE
  • The theoretical impact of this vulnerability is that the attacker can execute scripts on the affected system of the victim that will execute with the privileges of the victim. If the victim has administrative privileges the attacker's injected scripts would allow the attacker to access all files, stop/start some services and change limited configuration settings.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 10.10.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 10.7.0
Affected: 10.8.0
Affected: 10.8.1
Affected: 10.9.0
Affected: 10.10.0
Affected: 10.10.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 10.10.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: 10.7.0
Affected: 10.8.0
Affected: 10.8.1
Affected: 10.9.0
Affected: 10.10.0
Affected: 10.10.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:26:16.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.8.1"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.8.1"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            }
          ]
        }
      ],
      "datePublic": "2020-09-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The theoretical impact of this vulnerability is that the attacker can execute scripts on the affected system of the victim that will execute with the privileges of the victim. If the victim has administrative privileges the attacker\u0027s injected scripts would allow the attacker to access all files, stop/start some services and change limited configuration settings.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-15T19:06:09",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Stored Cross Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2020-09-15T17:00:00Z",
          "ID": "CVE-2020-9416",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Stored Cross Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The theoretical impact of this vulnerability is that the attacker can execute scripts on the affected system of the victim that will execute with the privileges of the victim. If the victim has administrative privileges the attacker\u0027s injected scripts would allow the attacker to access all files, stop/start some services and change limited configuration settings."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "CONFIRM",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2020-9416",
    "datePublished": "2020-09-15T18:55:11.663340Z",
    "dateReserved": "2020-02-26T00:00:00",
    "dateUpdated": "2024-09-16T19:20:42.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-17334 (GCVE-0-2019-17334)

Vulnerability from cvelistv5 – Published: 2019-12-17 20:55 – Updated: 2024-09-16 18:39
VLAI?
Title
TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.
CWE
  • The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 7.11.1 (custom)
Affected: 7.12.0
Affected: 7.13.0
Affected: 7.14.0
Affected: 10.0.0
Affected: 10.1.0
Affected: 10.2.0
Affected: 10.3.0
Affected: 10.3.1
Affected: 10.3.2
Affected: 10.4.0
Affected: 10.5.0
Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Deployment Kit Affected: unspecified , ≤ 7.11.1 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 7.11.1 (custom)
Affected: 7.12.0
Affected: 7.13.0
Affected: 7.14.0
Affected: 10.0.0
Affected: 10.1.0
Affected: 10.2.0
Affected: 10.3.0
Affected: 10.3.1
Affected: 10.3.2
Affected: 10.4.0
Affected: 10.5.0
Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Language Packs Affected: unspecified , ≤ 7.11.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:40:14.457Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            },
            {
              "status": "affected",
              "version": "7.13.0"
            },
            {
              "status": "affected",
              "version": "7.14.0"
            },
            {
              "status": "affected",
              "version": "10.0.0"
            },
            {
              "status": "affected",
              "version": "10.1.0"
            },
            {
              "status": "affected",
              "version": "10.2.0"
            },
            {
              "status": "affected",
              "version": "10.3.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            },
            {
              "status": "affected",
              "version": "10.3.2"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.5.0"
            },
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Deployment Kit",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            },
            {
              "status": "affected",
              "version": "7.13.0"
            },
            {
              "status": "affected",
              "version": "7.14.0"
            },
            {
              "status": "affected",
              "version": "10.0.0"
            },
            {
              "status": "affected",
              "version": "10.1.0"
            },
            {
              "status": "affected",
              "version": "10.2.0"
            },
            {
              "status": "affected",
              "version": "10.3.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            },
            {
              "status": "affected",
              "version": "10.3.2"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.5.0"
            },
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop Language Packs",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-17T20:55:16",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2019-12-17T17:00:00Z",
          "ID": "CVE-2019-17334",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.13.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.14.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.1.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.2.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.4.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.13.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.14.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.1.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.2.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.4.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "MISC",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334",
              "refsource": "MISC",
              "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2019-17334",
    "datePublished": "2019-12-17T20:55:17.037330Z",
    "dateReserved": "2019-10-07T00:00:00",
    "dateUpdated": "2024-09-16T18:39:10.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-3180 (GCVE-0-2017-3180)

Vulnerability from cvelistv5 – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Title
Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
Severity ?
No CVSS data available.
CWE
Assigner
References
Impacted products
Vendor Product Version
TIBCO Silver Fabric Enabler for Spotfire Web Player Affected: 2.1.2 , ≤ 2.1.2 (custom)
Create a notification for this product.
    TIBCO Spotfire Analyst Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Create a notification for this product.
    TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 7.0.2 , ≤ 7.0.2 (custom)
Create a notification for this product.
    TIBCO Spotfire Automation Services 6 Affected: 7.0.0
Affected: 7.0.1
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
    TIBCO Spotfire Connectors Affected: 7.6.0
Create a notification for this product.
    TIBCO Spotfire Deployment Kit Affected: 7.0.0
Affected: 7.0.1
Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
    TIBCO Spotfire Desktop Affected: 7.0.0
Affected: 7.0.1
Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Affected: 6.5.2 , ≤ 6.5.2 (custom)
Create a notification for this product.
    TIBCO Spotfire Desktop Developer Edition Affected: 7.7.0
Create a notification for this product.
    TIBCO Spotfire Desktop Language Packs Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Affected: 7.0.1 , ≤ 7.0.1 (custom)
Create a notification for this product.
    TIBCO Spotfire Professional Affected: 7.0.0
Affected: 7.0.1
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
    TIBCO Spotfire Web Player Affected: 7.0.0
Affected: 7.0.1
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:16:28.225Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
          },
          {
            "name": "95699",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "https://www.securityfocus.com/bid/95699"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Silver Fabric Enabler for Spotfire Web Player ",
          "vendor": "TIBCO",
          "versions": [
            {
              "lessThanOrEqual": "2.1.2",
              "status": "affected",
              "version": "2.1.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Analyst",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO",
          "versions": [
            {
              "lessThanOrEqual": "7.0.2",
              "status": "affected",
              "version": "7.0.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Automation Services 6",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Connectors",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            }
          ]
        },
        {
          "product": "Spotfire Deployment Kit",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Desktop",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            },
            {
              "lessThanOrEqual": "6.5.2",
              "status": "affected",
              "version": "6.5.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Developer Edition",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Language Packs",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            },
            {
              "lessThanOrEqual": "7.0.1",
              "status": "affected",
              "version": "7.0.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Professional",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Web Player",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2017-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-24T14:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
        },
        {
          "name": "95699",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "https://www.securityfocus.com/bid/95699"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2017-3180",
          "STATE": "PUBLIC",
          "TITLE": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Silver Fabric Enabler for Spotfire Web Player ",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "2.1.2",
                            "version_value": "2.1.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "7.0.2",
                            "version_value": "7.0.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Automation Services 6",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Connectors",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.2",
                            "version_value": "6.5.2"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Developer Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Professional",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Web Player",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
            },
            {
              "name": "95699",
              "refsource": "BID",
              "url": "https://www.securityfocus.com/bid/95699"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2017-3180",
    "datePublished": "2018-07-24T15:00:00",
    "dateReserved": "2016-12-05T00:00:00",
    "dateUpdated": "2024-08-05T14:16:28.225Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-3181 (GCVE-0-2017-3181)

Vulnerability from cvelistv5 – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Title
Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query
Summary
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client
Severity ?
No CVSS data available.
CWE
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:16:28.244Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
          },
          {
            "name": "95696",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "https://www.securityfocus.com/bid/95696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Spotfire Analyst",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Connectors",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            }
          ]
        },
        {
          "product": "Spotfire Deployment Kit",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Developer Edition",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Language Packs",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Web Player Client",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "unknown",
              "version": "N/A"
            }
          ]
        },
        {
          "product": "Spotfire Client",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "unknown",
              "version": "N/A"
            }
          ]
        }
      ],
      "datePublic": "2017-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-24T14:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
        },
        {
          "name": "95696",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "https://www.securityfocus.com/bid/95696"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2017-3181",
          "STATE": "PUBLIC",
          "TITLE": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Connectors",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Developer Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Web Player Client",
                      "version": {
                        "version_data": [
                          {
                            "affected": "?",
                            "version_affected": "?",
                            "version_value": "N/A"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Client",
                      "version": {
                        "version_data": [
                          {
                            "affected": "?",
                            "version_affected": "?",
                            "version_value": "N/A"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-89"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
            },
            {
              "name": "95696",
              "refsource": "BID",
              "url": "https://www.securityfocus.com/bid/95696"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2017-3181",
    "datePublished": "2018-07-24T15:00:00",
    "dateReserved": "2016-12-05T00:00:00",
    "dateUpdated": "2024-08-05T14:16:28.244Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-5437 (GCVE-0-2018-5437)

Vulnerability from cvelistv5 – Published: 2018-06-27 16:00 – Updated: 2024-09-17 01:25
VLAI?
Title
TIBCO Spotfire Product Family Information Disclosure Vulnerability
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
CWE
  • The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 7.8.0 (custom)
Affected: 7.9.0
Affected: 7.9.1
Affected: 7.10.0
Affected: 7.10.1
Affected: 7.11.0
Affected: 7.12.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: unspecified , ≤ 7.12.0 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Deployment Kit Affected: unspecified , ≤ 7.8.0 (custom)
Affected: 7.9.0
Affected: 7.9.1
Affected: 7.10.0
Affected: 7.10.1
Affected: 7.11.0
Affected: 7.12.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 7.8.0 (custom)
Affected: 7.9.0
Affected: 7.9.1
Affected: 7.10.0
Affected: 7.10.1
Affected: 7.11.0
Affected: 7.12.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Language Packs Affected: unspecified , ≤ 7.8.0 (custom)
Affected: 7.9.0
Affected: 7.9.1
Affected: 7.10.0
Affected: 7.10.1
Affected: 7.11.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T05:33:44.438Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.8.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.9.0"
            },
            {
              "status": "affected",
              "version": "7.9.1"
            },
            {
              "status": "affected",
              "version": "7.10.0"
            },
            {
              "status": "affected",
              "version": "7.10.1"
            },
            {
              "status": "affected",
              "version": "7.11.0"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.12.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Deployment Kit",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.8.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.9.0"
            },
            {
              "status": "affected",
              "version": "7.9.1"
            },
            {
              "status": "affected",
              "version": "7.10.0"
            },
            {
              "status": "affected",
              "version": "7.10.1"
            },
            {
              "status": "affected",
              "version": "7.11.0"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.8.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.9.0"
            },
            {
              "status": "affected",
              "version": "7.9.1"
            },
            {
              "status": "affected",
              "version": "7.10.0"
            },
            {
              "status": "affected",
              "version": "7.10.1"
            },
            {
              "status": "affected",
              "version": "7.11.0"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop Language Packs",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.8.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.9.0"
            },
            {
              "status": "affected",
              "version": "7.9.1"
            },
            {
              "status": "affected",
              "version": "7.10.0"
            },
            {
              "status": "affected",
              "version": "7.10.1"
            },
            {
              "status": "affected",
              "version": "7.11.0"
            }
          ]
        }
      ],
      "datePublic": "2018-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-06-29T15:57:01",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues. When upgrading to one of the new versions some previously working functionality will be disabled by default and require configuration. Please review the README and other documentation for further information. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Product Family Information Disclosure Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2018-06-26T16:00:00.000Z",
          "ID": "CVE-2018-5437",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Product Family Information Disclosure Vulnerability",
          "UPDATED": "2018-06-28T18:00:00.000Z"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_value": "7.8.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.11.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_value": "7.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_value": "7.8.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.11.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_value": "7.8.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.11.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_value": "7.8.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.9.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.10.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_value": "7.11.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
            },
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "MISC",
              "url": "http://www.tibco.com/services/support/advisories"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues. When upgrading to one of the new versions some previously working functionality will be disabled by default and require configuration. Please review the README and other documentation for further information. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2018-5437",
    "datePublished": "2018-06-27T16:00:00Z",
    "dateReserved": "2018-01-12T00:00:00",
    "dateUpdated": "2024-09-17T01:25:43.883Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-3115 (GCVE-0-2025-3115)

Vulnerability from nvd – Published: 2025-04-09 18:12 – Updated: 2025-11-11 11:47
VLAI?
Title
Spotfire Data Function Vulnerability
Summary
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
Impacted products
Vendor Product Version
Spotfire Spotfire Statistics Services Affected: 14 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Analyst Affected: 14.0 , < 14.0.6 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Deployment Kit used in Spotfire Server Affected: 14.0 , < 14.0.7 (Patch)
Affected: 14.1.0 (Patch)
Affected: 14.2.0 (Patch)
Affected: 14.3.0 (Patch)
Affected: 14.4.0 (Patch)
Affected: 14.4.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Desktop Affected: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire for AWS Marketplace Unknown: 14.4 , < 14.4.2 (Patch)
Create a notification for this product.
    Spotfire Spotfire Enterprise Runtime for R - Server Edition Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 (Patch)
Affected: 1.19.0 (Patch)
Affected: 1.20.0 (Patch)
Affected: 1.21.0 (Patch)
Affected: 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for Python Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
    Spotfire Spotfire Service for R Affected: 1.17 , < 1.17.7 (Patch)
Affected: 1.18.0 , ≤ 1.21.1 (Patch)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3115",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:28:35.698097Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:29:39.691Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Spotfire Statistics Services",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.6",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Deployment Kit used in Spotfire Server",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.0.7",
              "status": "affected",
              "version": "14.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.1.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.2.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.3.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "14.4.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Desktop",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "affected",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "14.4.2",
              "status": "unknown",
              "version": "14.4",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Enterprise Runtime for R - Server Edition",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.19.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.20.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.0",
              "versionType": "Patch"
            },
            {
              "status": "affected",
              "version": "1.21.1",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for Python",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Service for R",
          "vendor": "Spotfire",
          "versions": [
            {
              "lessThan": "1.17.7",
              "status": "affected",
              "version": "1.17",
              "versionType": "Patch"
            },
            {
              "lessThanOrEqual": "1.21.1",
              "status": "affected",
              "version": "1.18.0",
              "versionType": "Patch"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\n\n\u003cstrong\u003eInjection Vulnerabilities: \u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAttackers can inject malicious code, potentially gaining control over the system executing these functions.\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution\u003c/span\u003e\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.\nAdditionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution"
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-11T11:47:58.064Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3115-r3485/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Spotfire Data Function Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2025-3115",
    "datePublished": "2025-04-09T18:12:28.348Z",
    "dateReserved": "2025-04-02T10:56:03.148Z",
    "dateUpdated": "2025-11-11T11:47:58.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-26221 (GCVE-0-2023-26221)

Vulnerability from nvd – Published: 2023-11-08 19:44 – Updated: 2024-09-04 15:46
VLAI?
Title
TIBCO Spotfire Insufficiently Protected Credential vulnerability
Summary
The Spotfire Connectors component of TIBCO Software Inc.'s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.
CWE
  • CWE-522 - Insufficiently Protected Credentials
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. Spotfire Analyst Affected: 12.3.0
Affected: 12.4.0
Affected: 12.5.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:46:23.940Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/services/support/advisories"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26221",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-04T15:46:35.719041Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-04T15:46:47.013Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.3.0"
            },
            {
              "status": "affected",
              "version": "12.4.0"
            },
            {
              "status": "affected",
              "version": "12.5.0"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.3.0"
            },
            {
              "status": "affected",
              "version": "12.4.0"
            },
            {
              "status": "affected",
              "version": "12.5.0"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe Spotfire Connectors component of TIBCO Software Inc.\u0027s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.\u003c/p\u003e"
            }
          ],
          "value": "The Spotfire Connectors component of TIBCO Software Inc.\u0027s Spotfire Analyst, Spotfire Server, and Spotfire for AWS Marketplace contains an easily exploitable vulnerability that allows a low privileged attacker with read/write access to craft malicious Analyst files. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 12.3.0, 12.4.0, and 12.5.0, Spotfire Server: versions 12.3.0, 12.4.0, and 12.5.0, and Spotfire for AWS Marketplace: version 12.5.0.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-522",
              "description": "CWE-522 Insufficiently Protected Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-08T19:44:03.634Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://www.tibco.com/services/support/advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eTIBCO has released updated versions of the affected components which address these issues.\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\u003c/p\u003e\u003cp\u003eSpotfire for AWS Marketplace version 12.5.0: update to version 14.0.0 or later\u003c/p\u003e"
            }
          ],
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nSpotfire Analyst versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\n\nSpotfire Server versions 12.3.0, 12.4.0, and 12.5.0: update to version 14.0.0 or later\n\nSpotfire for AWS Marketplace version 12.5.0: update to version 14.0.0 or later\n\n"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Insufficiently Protected Credential vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2023-26221",
    "datePublished": "2023-11-08T19:44:03.634Z",
    "dateReserved": "2023-02-20T22:18:23.428Z",
    "dateUpdated": "2024-09-04T15:46:47.013Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26220 (GCVE-0-2023-26220)

Vulnerability from nvd – Published: 2023-10-10 22:06 – Updated: 2024-09-18 16:14
VLAI?
Title
TIBCO Spotfire Stored Cross-site Scripting (XSS) vulnerability
Summary
The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. Spotfire Analyst Affected: 0 , ≤ 11.4.7 (semver)
Affected: 11.5.0
Affected: 11.6.0
Affected: 11.7.0
Affected: 11.8.0
Affected: 12.0.0
Affected: 12.0.1
Affected: 12.0.2
Affected: 12.0.3
Affected: 12.0.4
Affected: 12.1.0
Affected: 12.1.1
Create a notification for this product.
    TIBCO Software Inc. Spotfire Server Affected: 0 , ≤ 11.4.11 (semver)
Affected: 11.5.0
Affected: 11.6.0
Affected: 11.6.1
Affected: 11.6.2
Affected: 11.6.3
Affected: 11.7.0
Affected: 11.8.0
Affected: 11.8.1
Affected: 12.0.0
Affected: 12.0.1
Affected: 12.0.2
Affected: 12.0.3
Affected: 12.0.4
Affected: 12.0.5
Affected: 12.1.0
Affected: 12.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:46:24.112Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/services/support/advisories"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26220",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-18T16:14:40.488828Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-18T16:14:49.914Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.7",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            },
            {
              "status": "affected",
              "version": "12.0.2"
            },
            {
              "status": "affected",
              "version": "12.0.3"
            },
            {
              "status": "affected",
              "version": "12.0.4"
            },
            {
              "status": "affected",
              "version": "12.1.0"
            },
            {
              "status": "affected",
              "version": "12.1.1"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.6.1"
            },
            {
              "status": "affected",
              "version": "11.6.2"
            },
            {
              "status": "affected",
              "version": "11.6.3"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "11.8.1"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            },
            {
              "status": "affected",
              "version": "12.0.2"
            },
            {
              "status": "affected",
              "version": "12.0.3"
            },
            {
              "status": "affected",
              "version": "12.0.4"
            },
            {
              "status": "affected",
              "version": "12.0.5"
            },
            {
              "status": "affected",
              "version": "12.1.0"
            },
            {
              "status": "affected",
              "version": "12.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe Spotfire Library component of TIBCO Software Inc.\u0027s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\u003c/p\u003e"
            }
          ],
          "value": "The Spotfire Library component of TIBCO Software Inc.\u0027s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-10T22:06:36.002Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://www.tibco.com/services/support/advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eTIBCO has released updated versions of the affected components which address these issues.\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or later\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4: update to version 12.0.5 or later\u003c/p\u003e\u003cp\u003eSpotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 11.4.11 and below: update to version 11.4.12 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5: update to version 12.0.6 or later\u003c/p\u003e\u003cp\u003eSpotfire Server versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\u003c/p\u003e"
            }
          ],
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nSpotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or later\n\nSpotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4: update to version 12.0.5 or later\n\nSpotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\n\nSpotfire Server versions 11.4.11 and below: update to version 11.4.12 or later\n\nSpotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5: update to version 12.0.6 or later\n\nSpotfire Server versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\n\n"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "TIBCO Spotfire Stored Cross-site Scripting (XSS) vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2023-26220",
    "datePublished": "2023-10-10T22:06:36.002Z",
    "dateReserved": "2023-02-20T22:18:23.427Z",
    "dateUpdated": "2024-09-18T16:14:49.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-41558 (GCVE-0-2022-41558)

Vulnerability from nvd – Published: 2022-11-15 18:15 – Updated: 2025-04-29 20:08
VLAI?
Title
TIBCO Spotfire Stored Cross Site Scripting (XSS) Vulnerability
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0.
CWE
  • Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 11.4.4 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analyst Affected: 11.5.0
Affected: 11.6.0
Affected: 11.7.0
Affected: 11.8.0
Affected: 12.0.0
Affected: 12.0.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analyst Affected: 12.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: unspecified , ≤ 12.1.0 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 11.4.4 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: 11.5.0
Affected: 11.6.0
Affected: 11.7.0
Affected: 11.8.0
Affected: 12.0.0
Affected: 12.0.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: 12.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: unspecified , ≤ 11.4.8 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: 11.5.0
Affected: 11.6.0
Affected: 11.6.1
Affected: 11.6.2
Affected: 11.6.3
Affected: 11.7.0
Affected: 11.8.0
Affected: 11.8.1
Affected: 12.0.0
Affected: 12.0.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: 12.1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:42:46.398Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-41558",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-29T20:08:19.885043Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T20:08:32.390Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "12.1.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.4.8",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.0"
            },
            {
              "status": "affected",
              "version": "11.6.0"
            },
            {
              "status": "affected",
              "version": "11.6.1"
            },
            {
              "status": "affected",
              "version": "11.6.2"
            },
            {
              "status": "affected",
              "version": "11.6.3"
            },
            {
              "status": "affected",
              "version": "11.7.0"
            },
            {
              "status": "affected",
              "version": "11.8.0"
            },
            {
              "status": "affected",
              "version": "11.8.1"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "12.0.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "12.1.0"
            }
          ]
        }
      ],
      "datePublic": "2022-11-15T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00.000Z",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "url": "https://www.tibco.com/services/support/advisories"
        },
        {
          "url": "https://www.tibco.com/support/advisories/2022/11/tibco-security-advisory-november-15-2022-tibco-spotfire-cve-2022-41558"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Analyst version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 12.1.0 and below: update to version 12.1.1 or later\nTIBCO Spotfire Desktop versions 11.4.4 and below: update to version 11.4.5 or later\nTIBCO Spotfire Desktop versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Desktop version 12.1.0: update to version 12.1.1 or later\nTIBCO Spotfire Server versions 11.4.8 and below: update to version 11.4.9 or later\nTIBCO Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1: update to version 12.0.2 or later\nTIBCO Spotfire Server version 12.1.0: update to version 12.1.1 or later"
        }
      ],
      "source": {
        "discovery": "Discovery statement"
      },
      "title": "TIBCO Spotfire Stored Cross Site Scripting (XSS) Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2022-41558",
    "datePublished": "2022-11-15T18:15:12.527Z",
    "dateReserved": "2022-09-26T00:00:00.000Z",
    "dateUpdated": "2025-04-29T20:08:32.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-23273 (GCVE-0-2021-23273)

Vulnerability from nvd – Published: 2021-03-09 20:35 – Updated: 2024-09-16 23:15
VLAI?
Title
TIBCO Spotfire Cross Site Scripting Vulnerability
Summary
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0.
CWE
  • The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 10.3.3 (custom)
Affected: 10.10.0
Affected: 10.10.1
Affected: 10.10.2
Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 11.0.0
Affected: 11.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: unspecified , ≤ 11.1.0 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 10.3.3 (custom)
Affected: 10.10.0
Affected: 10.10.1
Affected: 10.10.2
Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 11.0.0
Affected: 11.1.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: unspecified , ≤ 10.3.11 (custom)
Affected: 10.10.0
Affected: 10.10.1
Affected: 10.10.2
Affected: 10.10.3
Affected: 10.7.0
Affected: 10.8.0
Affected: 10.8.1
Affected: 10.9.0
Affected: 11.0.0
Affected: 11.1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:55.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "10.3.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            },
            {
              "status": "affected",
              "version": "10.10.2"
            },
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "11.0.0"
            },
            {
              "status": "affected",
              "version": "11.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "11.1.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "10.3.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            },
            {
              "status": "affected",
              "version": "10.10.2"
            },
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "11.0.0"
            },
            {
              "status": "affected",
              "version": "11.1.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "10.3.11",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            },
            {
              "status": "affected",
              "version": "10.10.2"
            },
            {
              "status": "affected",
              "version": "10.10.3"
            },
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.8.1"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "11.0.0"
            },
            {
              "status": "affected",
              "version": "11.1.0"
            }
          ]
        }
      ],
      "datePublic": "2021-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-09T21:06:28",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Cross Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2021-03-09T17:00:00Z",
          "ID": "CVE-2021-23273",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Cross Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.3.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.3.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "10.3.11"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "11.1.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a stored Cross Site Scripting (XSS) attack on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 11.1.0 and below, TIBCO Spotfire Desktop: versions 10.3.3 and below, versions 10.10.0, 10.10.1, and 10.10.2, versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0, and TIBCO Spotfire Server: versions 10.3.11 and below, versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3, versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The impact of this vulnerability includes the theoretical possibility that an attacker gains access, including potentially administrative access, to the affected system."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "CONFIRM",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2021/03/tibco-security-advisory-march-9-2021-tibco-spotfire"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Analyst versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 11.1.0 and below update to version 11.2.0 or higher\nTIBCO Spotfire Desktop versions 10.3.3 and below update to version 10.3.4 or higher\nTIBCO Spotfire Desktop versions 10.10.0, 10.10.1, and 10.10.2 update to version 10.10.3 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher\nTIBCO Spotfire Server versions 10.3.11 and below update to version 10.3.12 or higher\nTIBCO Spotfire Server versions 10.10.0, 10.10.1, 10.10.2, and 10.10.3 update to version 10.10.4 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 11.0.0, and 11.1.0 update to version 11.2.0 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2021-23273",
    "datePublished": "2021-03-09T20:35:16.543095Z",
    "dateReserved": "2021-01-08T00:00:00",
    "dateUpdated": "2024-09-16T23:15:56.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-9416 (GCVE-0-2020-9416)

Vulnerability from nvd – Published: 2020-09-15 18:55 – Updated: 2024-09-16 19:20
VLAI?
Title
TIBCO Spotfire Stored Cross Site Scripting Vulnerability
Summary
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1.
CWE
  • The theoretical impact of this vulnerability is that the attacker can execute scripts on the affected system of the victim that will execute with the privileges of the victim. If the victim has administrative privileges the attacker's injected scripts would allow the attacker to access all files, stop/start some services and change limited configuration settings.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 10.10.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 10.7.0
Affected: 10.8.0
Affected: 10.8.1
Affected: 10.9.0
Affected: 10.10.0
Affected: 10.10.1
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: 10.7.0
Affected: 10.8.0
Affected: 10.9.0
Affected: 10.10.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: 10.7.0
Affected: 10.8.0
Affected: 10.8.1
Affected: 10.9.0
Affected: 10.10.0
Affected: 10.10.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:26:16.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.8.1"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.7.0"
            },
            {
              "status": "affected",
              "version": "10.8.0"
            },
            {
              "status": "affected",
              "version": "10.8.1"
            },
            {
              "status": "affected",
              "version": "10.9.0"
            },
            {
              "status": "affected",
              "version": "10.10.0"
            },
            {
              "status": "affected",
              "version": "10.10.1"
            }
          ]
        }
      ],
      "datePublic": "2020-09-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The theoretical impact of this vulnerability is that the attacker can execute scripts on the affected system of the victim that will execute with the privileges of the victim. If the victim has administrative privileges the attacker\u0027s injected scripts would allow the attacker to access all files, stop/start some services and change limited configuration settings.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-15T19:06:09",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Stored Cross Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2020-09-15T17:00:00Z",
          "ID": "CVE-2020-9416",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Stored Cross Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.7.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.8.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.9.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.10.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Spotfire client component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The theoretical impact of this vulnerability is that the attacker can execute scripts on the affected system of the victim that will execute with the privileges of the victim. If the victim has administrative privileges the attacker\u0027s injected scripts would allow the attacker to access all files, stop/start some services and change limited configuration settings."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "CONFIRM",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2020/09/tibco-security-advisory-september-15-2020-tibco-spotfire"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher\nTIBCO Spotfire Desktop versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0 update to version 10.10.1 or higher\nTIBCO Spotfire Server versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1 update to version 10.10.2 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2020-9416",
    "datePublished": "2020-09-15T18:55:11.663340Z",
    "dateReserved": "2020-02-26T00:00:00",
    "dateUpdated": "2024-09-16T19:20:42.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-17334 (GCVE-0-2019-17334)

Vulnerability from nvd – Published: 2019-12-17 20:55 – Updated: 2024-09-16 18:39
VLAI?
Title
TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.
CWE
  • The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analyst Affected: unspecified , ≤ 7.11.1 (custom)
Affected: 7.12.0
Affected: 7.13.0
Affected: 7.14.0
Affected: 10.0.0
Affected: 10.1.0
Affected: 10.2.0
Affected: 10.3.0
Affected: 10.3.1
Affected: 10.3.2
Affected: 10.4.0
Affected: 10.5.0
Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Deployment Kit Affected: unspecified , ≤ 7.11.1 (custom)
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Affected: unspecified , ≤ 7.11.1 (custom)
Affected: 7.12.0
Affected: 7.13.0
Affected: 7.14.0
Affected: 10.0.0
Affected: 10.1.0
Affected: 10.2.0
Affected: 10.3.0
Affected: 10.3.1
Affected: 10.3.2
Affected: 10.4.0
Affected: 10.5.0
Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Desktop Language Packs Affected: unspecified , ≤ 7.11.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:40:14.457Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analyst",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            },
            {
              "status": "affected",
              "version": "7.13.0"
            },
            {
              "status": "affected",
              "version": "7.14.0"
            },
            {
              "status": "affected",
              "version": "10.0.0"
            },
            {
              "status": "affected",
              "version": "10.1.0"
            },
            {
              "status": "affected",
              "version": "10.2.0"
            },
            {
              "status": "affected",
              "version": "10.3.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            },
            {
              "status": "affected",
              "version": "10.3.2"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.5.0"
            },
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Deployment Kit",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            },
            {
              "status": "affected",
              "version": "7.13.0"
            },
            {
              "status": "affected",
              "version": "7.14.0"
            },
            {
              "status": "affected",
              "version": "10.0.0"
            },
            {
              "status": "affected",
              "version": "10.1.0"
            },
            {
              "status": "affected",
              "version": "10.2.0"
            },
            {
              "status": "affected",
              "version": "10.3.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            },
            {
              "status": "affected",
              "version": "10.3.2"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.5.0"
            },
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Desktop Language Packs",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-17T20:55:16",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2019-12-17T17:00:00Z",
          "ID": "CVE-2019-17334",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.13.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.14.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.1.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.2.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.4.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.13.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.14.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.1.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.2.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.4.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "MISC",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334",
              "refsource": "MISC",
              "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2019-17334",
    "datePublished": "2019-12-17T20:55:17.037330Z",
    "dateReserved": "2019-10-07T00:00:00",
    "dateUpdated": "2024-09-16T18:39:10.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-3180 (GCVE-0-2017-3180)

Vulnerability from nvd – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Title
Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
Severity ?
No CVSS data available.
CWE
Assigner
References
Impacted products
Vendor Product Version
TIBCO Silver Fabric Enabler for Spotfire Web Player Affected: 2.1.2 , ≤ 2.1.2 (custom)
Create a notification for this product.
    TIBCO Spotfire Analyst Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Create a notification for this product.
    TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 7.0.2 , ≤ 7.0.2 (custom)
Create a notification for this product.
    TIBCO Spotfire Automation Services 6 Affected: 7.0.0
Affected: 7.0.1
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
    TIBCO Spotfire Connectors Affected: 7.6.0
Create a notification for this product.
    TIBCO Spotfire Deployment Kit Affected: 7.0.0
Affected: 7.0.1
Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
    TIBCO Spotfire Desktop Affected: 7.0.0
Affected: 7.0.1
Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Affected: 6.5.2 , ≤ 6.5.2 (custom)
Create a notification for this product.
    TIBCO Spotfire Desktop Developer Edition Affected: 7.7.0
Create a notification for this product.
    TIBCO Spotfire Desktop Language Packs Affected: 7.5.0
Affected: 7.6.0
Affected: 7.7.0
Affected: 7.0.1 , ≤ 7.0.1 (custom)
Create a notification for this product.
    TIBCO Spotfire Professional Affected: 7.0.0
Affected: 7.0.1
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
    TIBCO Spotfire Web Player Affected: 7.0.0
Affected: 7.0.1
Affected: 6.5.3 , ≤ 6.5.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:16:28.225Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
          },
          {
            "name": "95699",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "https://www.securityfocus.com/bid/95699"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Silver Fabric Enabler for Spotfire Web Player ",
          "vendor": "TIBCO",
          "versions": [
            {
              "lessThanOrEqual": "2.1.2",
              "status": "affected",
              "version": "2.1.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Analyst",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO",
          "versions": [
            {
              "lessThanOrEqual": "7.0.2",
              "status": "affected",
              "version": "7.0.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Automation Services 6",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Connectors",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            }
          ]
        },
        {
          "product": "Spotfire Deployment Kit",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Desktop",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            },
            {
              "lessThanOrEqual": "6.5.2",
              "status": "affected",
              "version": "6.5.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Developer Edition",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Language Packs",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.5.0"
            },
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            },
            {
              "lessThanOrEqual": "7.0.1",
              "status": "affected",
              "version": "7.0.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Professional",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Spotfire Web Player",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "status": "affected",
              "version": "7.0.1"
            },
            {
              "lessThanOrEqual": "6.5.3",
              "status": "affected",
              "version": "6.5.3",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2017-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-24T14:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
        },
        {
          "name": "95699",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "https://www.securityfocus.com/bid/95699"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2017-3180",
          "STATE": "PUBLIC",
          "TITLE": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Silver Fabric Enabler for Spotfire Web Player ",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "2.1.2",
                            "version_value": "2.1.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "7.0.2",
                            "version_value": "7.0.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Automation Services 6",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Connectors",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.2",
                            "version_value": "6.5.2"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Developer Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.5.0",
                            "version_value": "7.5.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Professional",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Web Player",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c=",
                            "version_affected": "\u003c=",
                            "version_name": "6.5.3",
                            "version_value": "6.5.3"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.0",
                            "version_value": "7.0.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.0.1",
                            "version_value": "7.0.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
            },
            {
              "name": "95699",
              "refsource": "BID",
              "url": "https://www.securityfocus.com/bid/95699"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2017-3180",
    "datePublished": "2018-07-24T15:00:00",
    "dateReserved": "2016-12-05T00:00:00",
    "dateUpdated": "2024-08-05T14:16:28.225Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-3181 (GCVE-0-2017-3181)

Vulnerability from nvd – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Title
Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query
Summary
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client
Severity ?
No CVSS data available.
CWE
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:16:28.244Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
          },
          {
            "name": "95696",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "https://www.securityfocus.com/bid/95696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Spotfire Analyst",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Connectors",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            }
          ]
        },
        {
          "product": "Spotfire Deployment Kit",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Developer Edition",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Desktop Language Packs",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "affected",
              "version": "7.6.0"
            },
            {
              "status": "affected",
              "version": "7.7.0"
            }
          ]
        },
        {
          "product": "Spotfire Web Player Client",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "unknown",
              "version": "N/A"
            }
          ]
        },
        {
          "product": "Spotfire Client",
          "vendor": "TIBCO",
          "versions": [
            {
              "status": "unknown",
              "version": "N/A"
            }
          ]
        }
      ],
      "datePublic": "2017-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-24T14:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
        },
        {
          "name": "95696",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "https://www.securityfocus.com/bid/95696"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2017-3181",
          "STATE": "PUBLIC",
          "TITLE": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Spotfire Analyst",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Connectors",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Deployment Kit",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Developer Edition",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Desktop Language Packs",
                      "version": {
                        "version_data": [
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.6.0",
                            "version_value": "7.6.0"
                          },
                          {
                            "affected": "=",
                            "version_affected": "=",
                            "version_name": "7.7.0",
                            "version_value": "7.7.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Web Player Client",
                      "version": {
                        "version_data": [
                          {
                            "affected": "?",
                            "version_affected": "?",
                            "version_value": "N/A"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Spotfire Client",
                      "version": {
                        "version_data": [
                          {
                            "affected": "?",
                            "version_affected": "?",
                            "version_value": "N/A"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-89"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181",
              "refsource": "CONFIRM",
              "url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
            },
            {
              "name": "95696",
              "refsource": "BID",
              "url": "https://www.securityfocus.com/bid/95696"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2017-3181",
    "datePublished": "2018-07-24T15:00:00",
    "dateReserved": "2016-12-05T00:00:00",
    "dateUpdated": "2024-08-05T14:16:28.244Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}