Search criteria
18 vulnerabilities found for spotfire_desktop_language_packs by tibco
FKIE_CVE-2019-17334
Vulnerability from fkie_nvd - Published: 2019-12-17 21:15 - Updated: 2024-11-21 04:32
Severity ?
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tibco | spotfire_analyst | * | |
| tibco | spotfire_analyst | 7.12.0 | |
| tibco | spotfire_analyst | 7.13.0 | |
| tibco | spotfire_analyst | 7.14.0 | |
| tibco | spotfire_analyst | 10.0.0 | |
| tibco | spotfire_analyst | 10.1.0 | |
| tibco | spotfire_analyst | 10.2.0 | |
| tibco | spotfire_analyst | 10.3.0 | |
| tibco | spotfire_analyst | 10.3.1 | |
| tibco | spotfire_analyst | 10.3.2 | |
| tibco | spotfire_analyst | 10.4.0 | |
| tibco | spotfire_analyst | 10.5.0 | |
| tibco | spotfire_analyst | 10.6.0 | |
| tibco | spotfire_analytics_platform_for_aws | 10.6.0 | |
| tibco | spotfire_deployment_kit | * | |
| tibco | spotfire_desktop | * | |
| tibco | spotfire_desktop | 7.12.0 | |
| tibco | spotfire_desktop | 7.13.0 | |
| tibco | spotfire_desktop | 7.14.0 | |
| tibco | spotfire_desktop | 10.0.0 | |
| tibco | spotfire_desktop | 10.1.0 | |
| tibco | spotfire_desktop | 10.2.0 | |
| tibco | spotfire_desktop | 10.3.0 | |
| tibco | spotfire_desktop | 10.3.1 | |
| tibco | spotfire_desktop | 10.3.2 | |
| tibco | spotfire_desktop | 10.4.0 | |
| tibco | spotfire_desktop | 10.5.0 | |
| tibco | spotfire_desktop | 10.6.0 | |
| tibco | spotfire_desktop_language_packs | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CB894D2-BCDB-4E0A-AA7B-4ACA4B8A1E4A",
"versionEndIncluding": "7.11.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98BBF9F4-E29A-43DE-9B82-38FEBDFDE18F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F18028-5359-4EAE-82AE-A9A0E9E95EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90A36A15-5120-4C99-ABA0-29948879FF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D625F1E-33A1-4A6D-A4A1-1BEF11633B2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC070A8-515C-4BFC-8777-C5C56A275018",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B81DE3A2-30BB-455A-ACD3-CDEBAEE9DBD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF65A903-2AF8-4A12-93F8-5645EA280808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C4BDDBE-3B8C-42E7-AA9B-0B166D807AE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "218EEDC3-9F1A-49A7-9ABA-6006AB0E5586",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F15EAA93-A037-4AA9-908A-3478E701CB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "73A1E671-2901-409C-9A34-234A401241A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74725E74-1940-4DD4-ABC2-C417CE911A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FFB885AA-2B0C-4CF1-9CFE-2EE31548D579",
"versionEndIncluding": "7.11.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "712FA45A-A06A-40EB-9D4E-2F13AF2FFC05",
"versionEndIncluding": "7.11.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C712D60-282E-4CB5-A6B3-2E8AB3D17C44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B99EE75F-9D35-43EA-A53C-1E792EAF640A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4DC3F-3F2F-4231-9A17-174C21E5634F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5F4A7F-EF07-40FE-91EE-750090857746",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72D8636D-13A4-4A6E-B946-120C4EA3BC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E56F19A5-E482-4DF0-8533-54602A2C482D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F932843-60C6-437D-81D5-8BAD642B0CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "14A497AD-F1A8-42DB-954A-FF0F9F309013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C0D79B-B880-4D70-8FF5-2B04B082A8C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "670A2ACC-EAEC-40B3-A47A-74871204A711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F288EDE4-5EA5-4B58-A113-FFDF68A70461",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F34C58D-DF67-4EDF-A27E-004248FB36A5",
"versionEndIncluding": "7.11.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
},
{
"lang": "es",
"value": "El componente Visualizations de TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform para AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, y TIBCO Spotfire Desktop Language Packs, contiene una vulnerabilidad que te\u00f3ricamente permite a un atacante, con permiso para escribir archivos DXP en la biblioteca de Spotfire, ejecutar c\u00f3digo remotamente de su elecci\u00f3n en la cuenta de usuario de otros usuarios que acceden al sistema afectado. Este ataque es un riesgo solo cuando el atacante tiene acceso de escritura a un sistema de archivos de red compartido con el sistema afectado. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versiones 7.11.1 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3 .1 y 10.3.2, versiones 10.4.0, 10.5.0 y 10.6.0, TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\u00f3n 10.6.0, TIBCO Spotfire Deployment Kit: versiones 7.11.1 y por debajo, TIBCO Spotfire Desktop : versiones 7.11.1 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1 y 10.3.2, versiones 10.4.0, 10.5.0 y 10.6.0, y TIBCO Spotfire Desktop Language Packs: versiones 7.11.1 y por debajo."
}
],
"id": "CVE-2019-17334",
"lastModified": "2024-11-21T04:32:06.507",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.9,
"impactScore": 6.0,
"source": "security@tibco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-17T21:15:12.097",
"references": [
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
],
"sourceIdentifier": "security@tibco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-3181
Vulnerability from fkie_nvd - Published: 2018-07-24 15:29 - Updated: 2024-11-21 03:24
Severity ?
Summary
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client
References
| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | https://www.securityfocus.com/bid/95696 | Third Party Advisory, VDB Entry | |
| cret@cert.org | https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.securityfocus.com/bid/95696 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tibco | spotfire_analyst | 7.7.0 | |
| tibco | spotfire_client | - | |
| tibco | spotfire_connectors | 7.6.0 | |
| tibco | spotfire_deployment_kit | 7.7.0 | |
| tibco | spotfire_desktop | 7.6.0 | |
| tibco | spotfire_desktop | 7.7.0 | |
| tibco | spotfire_desktop | 7.7.0 | |
| tibco | spotfire_desktop_language_packs | 7.6.0 | |
| tibco | spotfire_desktop_language_packs | 7.7.0 | |
| tibco | spotfire_web_player_client | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD36D84-B44B-48AA-9FD0-966DFBE5CFB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E5094B-61AD-4DF2-A3FF-4BCE872B4032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE55C07-E141-4DEA-A9E2-B075E1F56449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "11E31011-0D3C-4339-86F0-81CD77BC3439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12851913-2BAF-4B35-AD03-7C6B4A91C43E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF48FC-2634-4D66-8BD2-CB6D3CA04C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*",
"matchCriteriaId": "CA0557E9-5277-4D60-A1C6-1DC24FD7ECE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4FF6CF3-B05C-4014-83F5-3C44D09F4FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30D9DCB1-D307-42D0-A5CB-904D5DCCCD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2BBAD2-C1EB-4698-A598-1AF7A58B94D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
},
{
"lang": "es",
"value": "M\u00faltiples productos TIBCO son propensos a m\u00faltiples vulnerabilidades sin especificar de inyecci\u00f3n SQL debido a que fracasan a la hora de sanear entradas proporcionadas por el usuario antes de emplearlas en una consulta SQL. La explotaci\u00f3n de estos problemas podr\u00eda permitir que un atacante comprometa la aplicaci\u00f3n, acceda o modifique datos o explote vulnerabilidades latentes en la base de datos subyacente. Los siguientes productos y versiones se han visto afectados: TIBCO Spotfire Analyst 7.7.0; TIBCO Spotfire Connectors 7.6.0; TIBCO Spotfire Deployment Kit 7.7.0; TIBCO Spotfire Desktop 7.6.0; TIBCO Spotfire Desktop 7.7.0; TIBCO Spotfire Desktop Developer Edition 7.7.0; TIBCO Spotfire Desktop Language Packs 7.6.0; y TIBCO Spotfire Desktop Language Packs 7.7.0. Los siguientes componentes se han visto afectados: TIBCO Spotfire Client y TIBCO Spotfire Web Player Client."
}
],
"id": "CVE-2017-3181",
"lastModified": "2024-11-21T03:24:58.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-24T15:29:00.373",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.securityfocus.com/bid/95696"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.securityfocus.com/bid/95696"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "cret@cert.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-3180
Vulnerability from fkie_nvd - Published: 2018-07-24 15:29 - Updated: 2024-11-21 03:24
Severity ?
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
References
| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | https://www.securityfocus.com/bid/95699 | Third Party Advisory, VDB Entry | |
| cret@cert.org | https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.securityfocus.com/bid/95699 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_web_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "173CF2F8-3802-4D0B-B825-518F22753246",
"versionEndIncluding": "2.1.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CA67C3-1E04-4CF9-9DBF-5AAC32ED1BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE259A9-18D9-48D2-B1DF-E9244F6C79B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD36D84-B44B-48AA-9FD0-966DFBE5CFB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
"matchCriteriaId": "648B466E-6DDA-4A8E-BCD1-60A50B8E7680",
"versionEndIncluding": "7.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB0628A-9C75-4196-A28C-7C1B1A116C53",
"versionEndIncluding": "6.5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0424905D-696E-4D5F-957E-9D360F03E296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA7ABF1-F6DE-4908-9C09-8B523FD317A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE55C07-E141-4DEA-A9E2-B075E1F56449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F27A296C-6D4A-405B-86BB-F7D383C656E8",
"versionEndIncluding": "6.5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D050885E-62BF-454F-A653-129269829390",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA0A8EB-9A3B-415F-9823-50C4AAD4C9AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2A9DC-8D5F-4516-8581-0A719FEAC867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DADE970A-E3D6-41AC-A3E6-9F49090A0445",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "11E31011-0D3C-4339-86F0-81CD77BC3439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC24CB8-3411-438A-A99C-5DC0DD4A3128",
"versionEndIncluding": "6.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "981372F8-3050-42BA-BF94-16478E4B04A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A19D3881-3807-4EB0-B07E-116393FAA836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "584E8D2D-E0D9-4886-81D4-B2A629884F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12851913-2BAF-4B35-AD03-7C6B4A91C43E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF48FC-2634-4D66-8BD2-CB6D3CA04C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*",
"matchCriteriaId": "CA0557E9-5277-4D60-A1C6-1DC24FD7ECE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D894B719-865C-4EB3-B0E8-6853F1BC31A8",
"versionEndIncluding": "7.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A26FF0F0-3126-4AF6-A1FA-C911FB429648",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4FF6CF3-B05C-4014-83F5-3C44D09F4FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30D9DCB1-D307-42D0-A5CB-904D5DCCCD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF9238B-B335-4AC3-A866-A25D708CBE93",
"versionEndIncluding": "6.5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D883BEDD-2A54-4D01-8322-E7804D1D057A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE1B65E-1DAF-43A4-B5AC-956ABA66A078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9D754F3-9358-4163-9999-23AB931AA790",
"versionEndIncluding": "6.5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C96AC0E-4C68-4CDD-A73F-3B19D2EEFE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1959D810-72DC-4B6A-8BD9-6B80C49A5315",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
},
{
"lang": "es",
"value": "M\u00faltiples productos TIBCO son propensos a m\u00faltiples vulnerabilidades sin especificar de Cross-Site Scripting (XSS) debido a que fracasan a la hora de sanear entradas proporcionadas por el usuario. Un atacante podr\u00eda aprovechar estos problemas para ejecutar c\u00f3digo script arbitrario en el navegador de un usuario incauto en el contexto del sitio afectado. Esto puede permitir que el atacante robe credenciales de autenticaci\u00f3n basadas en cookies y lance otros ataques. Los productos y versiones afectadas incluyen: TIBCO Silver Fabric Enabler for Spotfire Web Player en versiones 2.1.2 y anteriores; TIBCO Spotfire Analyst 7.5.0; TIBCO Spotfire Analyst 7.6.0; TIBCO Spotfire Analyst 7.7.0; TIBCO Spotfire Analytics Platform for AWS Marketplace en versiones 7.0.2 y anteriores; TIBCO Spotfire Automation Services en versiones 6.5.3 y anteriores; TIBCO Spotfire Automation Services 7.0.0 y 7.0.1; TIBCO Spotfire Connectors 7.6.0; TIBCO Spotfire Deployment Kit en versiones 6.5.3 y anteriores; TIBCO Spotfire Deployment Kit 7.0.0 y 7.0.1; TIBCO Spotfire Deployment Kit 7.5.0; TIBCO Spotfire Deployment Kit 7.6.0; TIBCO Spotfire Deployment Kit 7.7.0; TIBCO Spotfire Desktop en versiones 6.5.2 y anteriores; TIBCO Spotfire Desktop 7.0.0 y 7.0.1; TIBCO Spotfire Desktop 7.5.0; TIBCO Spotfire Desktop 7.6.0; TIBCO Spotfire Desktop 7.7.0; TIBCO Spotfire Desktop Developer Edition 7.7.0; TIBCO Spotfire Desktop Language Packs en versiones 7.0.1 y anteriores; TIBCO Spotfire Desktop Language Packs 7.5.0; TIBCO Spotfire Desktop Language Packs 7.6.0; TIBCO Spotfire Desktop Language Packs 7.7.0; TIBCO Spotfire Professional en versiones 6.5.3 y anteriores; TIBCO Spotfire Professional 7.0.0 y 7.0.1 TIBCO Spotfire Web Player en versiones 6.5.3 y anteriores; y TIBCO Spotfire Web Player 7.0.0 y 7.0.1."
}
],
"id": "CVE-2017-3180",
"lastModified": "2024-11-21T03:24:58.687",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-24T15:29:00.327",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.securityfocus.com/bid/95699"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.securityfocus.com/bid/95699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "cret@cert.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-5435
Vulnerability from fkie_nvd - Published: 2018-06-27 16:29 - Updated: 2024-11-21 04:08
Severity ?
9.6 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10715379-262A-4BF6-81C1-E83EDFD0997D",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F156A08E-4322-4709-AB55-729DD88750C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D9BA58-24CC-49B0-9AAC-B5282739148F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A523064-C669-4E54-8144-028E67B9E101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE7860A0-9D92-4A36-82EE-652D259C82CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "807C6E14-4BA0-451D-BD58-60EA49693B19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07EB5484-D457-4782-B573-874F81C5706B",
"versionEndIncluding": "7.12.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339756F-D9E7-4C81-902B-A89508751623",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "707FD8E7-1D94-487A-9969-C2A24EB0B0CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1202BCD2-88B8-4C01-B847-0B62395C9E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD8CE0D2-2BD8-43D6-AEC6-0FF8A0172D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B4E3F39-B72D-4E61-B7A8-B0A9058615B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AA90E0-E644-4D57-94F8-D3CE47259286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B8CBAA0-9B0D-4C16-A9AD-4DD94D70E979",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2A8693-7280-438B-A8C4-CA8FCB81BEEB",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "242536E9-B5D5-4C28-AC6C-367E596B042E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "151FA030-E1DC-4557-A796-0F700D0FE322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "941B4BFF-B9C0-49E8-9799-EA3C607DC2EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FACDF7-464C-45D7-9C52-C773DDFEB695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD0D0AA-B286-4494-B55C-C46B9C7DA373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C93DB13-7E0B-4260-875F-8EC71BA10E4B",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6DB39B-3E4D-4BFB-8232-72EA87C7D156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC33387-D15B-4C9A-86E1-2E0A0B490B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21E52981-102A-4F56-BBE1-328FF63CD05F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD9867D-EEF9-4228-9B2A-06449813DD1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B43A6213-F9B4-4CBC-A34D-A67648DE0F54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10715379-262A-4BF6-81C1-E83EDFD0997D",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F156A08E-4322-4709-AB55-729DD88750C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D9BA58-24CC-49B0-9AAC-B5282739148F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A523064-C669-4E54-8144-028E67B9E101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE7860A0-9D92-4A36-82EE-652D259C82CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "807C6E14-4BA0-451D-BD58-60EA49693B19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07EB5484-D457-4782-B573-874F81C5706B",
"versionEndIncluding": "7.12.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339756F-D9E7-4C81-902B-A89508751623",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "707FD8E7-1D94-487A-9969-C2A24EB0B0CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1202BCD2-88B8-4C01-B847-0B62395C9E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD8CE0D2-2BD8-43D6-AEC6-0FF8A0172D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B4E3F39-B72D-4E61-B7A8-B0A9058615B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AA90E0-E644-4D57-94F8-D3CE47259286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B8CBAA0-9B0D-4C16-A9AD-4DD94D70E979",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2A8693-7280-438B-A8C4-CA8FCB81BEEB",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "242536E9-B5D5-4C28-AC6C-367E596B042E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "151FA030-E1DC-4557-A796-0F700D0FE322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "941B4BFF-B9C0-49E8-9799-EA3C607DC2EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FACDF7-464C-45D7-9C52-C773DDFEB695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD0D0AA-B286-4494-B55C-C46B9C7DA373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
},
{
"lang": "es",
"value": "Los componentes TIBCO Spotfire Client y TIBCO Spotfire Web Player Client de TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop y TIBCO Spotfire Desktop Language Packs de TIBCO Software Inc. contienen m\u00faltiples vulnerabilidades que podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo. Las versiones afectadas son TIBCO Spotfire Analyst hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace hasta las versi\u00f3n (inclusive) 7.12.0, TIBCO Spotfire Deployment Kit hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Desktop hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0 y TIBCO Spotfire Desktop Language Pack hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1 y 7.11.0 de TIBCO Software Inc."
}
],
"id": "CVE-2018-5435",
"lastModified": "2024-11-21T04:08:47.810",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0,
"source": "security@tibco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-27T16:29:00.347",
"references": [
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
],
"sourceIdentifier": "security@tibco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-5437
Vulnerability from fkie_nvd - Published: 2018-06-27 16:29 - Updated: 2024-11-21 04:08
Severity ?
6.8 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tibco | spotfire_analyst | * | |
| tibco | spotfire_analyst | 7.9.0 | |
| tibco | spotfire_analyst | 7.9.1 | |
| tibco | spotfire_analyst | 7.10.0 | |
| tibco | spotfire_analyst | 7.10.1 | |
| tibco | spotfire_analyst | 7.11.0 | |
| tibco | spotfire_analyst | 7.12.0 | |
| tibco | spotfire_analytics_platform_for_aws | * | |
| tibco | spotfire_deployment_kit | * | |
| tibco | spotfire_deployment_kit | 7.9.0 | |
| tibco | spotfire_deployment_kit | 7.9.1 | |
| tibco | spotfire_deployment_kit | 7.10.0 | |
| tibco | spotfire_deployment_kit | 7.10.1 | |
| tibco | spotfire_deployment_kit | 7.11.0 | |
| tibco | spotfire_deployment_kit | 7.12.0 | |
| tibco | spotfire_desktop | * | |
| tibco | spotfire_desktop | 7.9.0 | |
| tibco | spotfire_desktop | 7.9.1 | |
| tibco | spotfire_desktop | 7.10.0 | |
| tibco | spotfire_desktop | 7.10.1 | |
| tibco | spotfire_desktop | 7.11.0 | |
| tibco | spotfire_desktop | 7.12.0 | |
| tibco | spotfire_desktop_language_packs | * | |
| tibco | spotfire_desktop_language_packs | 7.9.0 | |
| tibco | spotfire_desktop_language_packs | 7.9.1 | |
| tibco | spotfire_desktop_language_packs | 7.10.0 | |
| tibco | spotfire_desktop_language_packs | 7.10.1 | |
| tibco | spotfire_desktop_language_packs | 7.11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10715379-262A-4BF6-81C1-E83EDFD0997D",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F156A08E-4322-4709-AB55-729DD88750C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D9BA58-24CC-49B0-9AAC-B5282739148F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A523064-C669-4E54-8144-028E67B9E101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE7860A0-9D92-4A36-82EE-652D259C82CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "807C6E14-4BA0-451D-BD58-60EA49693B19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9421F962-9DF2-47FC-A0D7-C90E6E2D0792",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07EB5484-D457-4782-B573-874F81C5706B",
"versionEndIncluding": "7.12.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339756F-D9E7-4C81-902B-A89508751623",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "707FD8E7-1D94-487A-9969-C2A24EB0B0CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1202BCD2-88B8-4C01-B847-0B62395C9E73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD8CE0D2-2BD8-43D6-AEC6-0FF8A0172D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B4E3F39-B72D-4E61-B7A8-B0A9058615B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AA90E0-E644-4D57-94F8-D3CE47259286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B8CBAA0-9B0D-4C16-A9AD-4DD94D70E979",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2A8693-7280-438B-A8C4-CA8FCB81BEEB",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "242536E9-B5D5-4C28-AC6C-367E596B042E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "151FA030-E1DC-4557-A796-0F700D0FE322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "941B4BFF-B9C0-49E8-9799-EA3C607DC2EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FACDF7-464C-45D7-9C52-C773DDFEB695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD0D0AA-B286-4494-B55C-C46B9C7DA373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "031D605C-66FE-40BC-B73C-D122944DBF08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C93DB13-7E0B-4260-875F-8EC71BA10E4B",
"versionEndIncluding": "7.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6DB39B-3E4D-4BFB-8232-72EA87C7D156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC33387-D15B-4C9A-86E1-2E0A0B490B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21E52981-102A-4F56-BBE1-328FF63CD05F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD9867D-EEF9-4228-9B2A-06449813DD1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B43A6213-F9B4-4CBC-A34D-A67648DE0F54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
},
{
"lang": "es",
"value": "Los componentes TIBCO Spotfire Client y TIBCO Spotfire Web Player Client de TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop y TIBCO Spotfire Desktop Language Packs de TIBCO Software Inc. contienen m\u00faltiples vulnerabilidades que podr\u00edan permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n. Las versiones afectadas son TIBCO Spotfire Analyst hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace hasta las versi\u00f3n (inclusive) 7.12.0, TIBCO Spotfire Deployment Kit hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0, TIBCO Spotfire Desktop hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0 y 7.12.0 y TIBCO Spotfire Desktop Language Pack hasta las versiones (inclusives) 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1 y 7.11.0 de TIBCO Software Inc."
}
],
"id": "CVE-2018-5437",
"lastModified": "2024-11-21T04:08:48.097",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0,
"source": "security@tibco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-27T16:29:00.443",
"references": [
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
}
],
"sourceIdentifier": "security@tibco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-4554
Vulnerability from fkie_nvd - Published: 2015-07-21 19:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57DC39D9-185E-43B3-9531-1C8009E3655A",
"versionEndIncluding": "5.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F84BEBA3-273C-4F88-94DA-8B85175866F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3F891B7-FD7E-47A0-8F38-C6BFC89CC72C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27FF438B-B7AC-4FBC-A833-8AC044562F01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "775D3D90-924C-41B0-B410-A86B0FD88771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1943C4FB-EA8E-4796-87CF-B5E3B6CE2AF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5619C4-83F5-4C1F-9668-E556A9F87E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D050885E-62BF-454F-A653-129269829390",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3123E2BA-9ECD-42E1-907D-8ACD160ED92F",
"versionEndIncluding": "5.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "266F4FB1-93F9-4A3A-98B1-7C1F72FD2422",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D806D55-863F-40CF-8025-8CD4319B7CE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8E66C534-ADEF-4019-9D8A-DE862E69F4BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09A1FABD-ADA4-4156-A013-86B0A7354D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F38E62A0-412F-46D7-9A8A-313B22F7B275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6E9CF1-A6A1-441E-9D73-6F5353E6D2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D883BEDD-2A54-4D01-8322-E7804D1D057A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2FC5EA-E43E-411F-A43E-A59AB75A9EF0",
"versionEndIncluding": "5.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B99855B-C096-4431-9C48-BF521478839D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22E0910B-2683-423A-B221-004CD3233D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7332A6C6-BA11-483D-B122-6A6532676012",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A722B273-B87E-4929-A155-57C57B4F2DB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F67094E7-B46D-470D-8652-DFB8E3D8B5F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "64B4D286-69ED-4BA2-B507-657E85B3E9AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C96AC0E-4C68-4CDD-A73F-3B19D2EEFE8E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "157572D1-02EF-4175-A047-B9927AC58E00",
"versionEndIncluding": "6.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "981372F8-3050-42BA-BF94-16478E4B04A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B0550DF-14AA-4FEB-A23F-F0B4F048845A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88DE3F8C-E5BB-4903-BAD7-D30F3B1D10F5",
"versionEndIncluding": "5.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB47D764-73E8-439F-8926-D33900537C2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5A4314-73D2-41F5-A0CB-093AD6721D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C9A2072-B7B0-403C-A67A-0D8D9E09E623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F0975D1-E4CC-41B6-AE83-CF8B8868ECA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "589EED8A-D63B-43C9-A6E5-9268A52AC25A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "532C8956-2EE3-40A4-9770-D6374FF13307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0424905D-696E-4D5F-957E-9D360F03E296",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69B182CF-358B-4100-A405-AEF1FF367476",
"versionEndIncluding": "5.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFDF6AB-0C5E-4758-AF64-0E12A55BF111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D812E975-F3D1-4199-ABE9-606E5E0C3303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7BFF4B74-6985-41D6-A2DA-4BD5E0A0E5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A31BED19-6530-438A-B4F4-8C085956FDD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E22C7ECD-0EB6-4F5F-8EAF-F4226C543DDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F908F48F-8CB7-4DB0-98ED-90FA5F5E4092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2E0969-1D24-4AEB-918B-163CAFC8134A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_webplayer:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F8B940A-A7F7-4136-B4BD-A30A6C42272E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5AEE71-18C6-41FC-9875-AD37C7D2749A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D330A100-EABC-40DD-9EA9-251ABDC1B10C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en TIBCO Spotfire Client y Spotfire Web Player Client en Spotfire Analyst en sus versiones anteriores a 5.5.2, 6.0.x anteriores a 6.0.3, 6.5.x anteriores a 6.5.3 y 7.0.x anteriores a 7.0.1; Spotfire Analytics Platform para AWS 6.5 y 7.0.x anteriores a 7.0.1; Spotfire Automation Services anteriores a 5.5.2, 6.0.x anteriores a 6.0.3, 6.5.x anteriores a 6.5.3 y 7.0.x anteriores a 7.0.1; Spotfire Deployment Kit anteriores a 5.5.2, 6.0.x anteriores a 6.0.3, 6.5.x anteriores a 6.5.3 y 7.0.x anteriores a 7.0.1; Spotfire Desktop anteriores a 6.5.2 y 7.0.x anteriores a 7.0.1; Spotfire Desktop Language Packs 7.0.x anteriores a 7.0.1; Spotfire Professional anteriores a 5.5.2, 6.0.x anteriores a 6.0.3, 6.5.x anteriores a 6.5.3 y 7.0.x anteriores a 7.0.1; Spotfire Web Player anteriores a 5.5.2, 6.0.x anteriores a 6.0.3, 6.5.x anteriores a 6.5.3 y 7.0.x anteriores a 7.0.1 y Silver Fabric Enabler para Spotfire Web Player anteriores a 2.1.1 permiten a atacantes remotos obtener informaci\u00f3n sensible o ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2015-4554",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-07-21T19:59:03.037",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1033015"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1033015"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/mk/advisory.jsp"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2019-17334 (GCVE-0-2019-17334)
Vulnerability from cvelistv5 – Published: 2019-12-17 20:55 – Updated: 2024-09-16 18:39
VLAI?
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.
Severity ?
7.6 (High)
CWE
- The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analyst |
Affected:
unspecified , ≤ 7.11.1
(custom)
Affected: 7.12.0 Affected: 7.13.0 Affected: 7.14.0 Affected: 10.0.0 Affected: 10.1.0 Affected: 10.2.0 Affected: 10.3.0 Affected: 10.3.1 Affected: 10.3.2 Affected: 10.4.0 Affected: 10.5.0 Affected: 10.6.0 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:40:14.457Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analyst",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.12.0"
},
{
"status": "affected",
"version": "7.13.0"
},
{
"status": "affected",
"version": "7.14.0"
},
{
"status": "affected",
"version": "10.0.0"
},
{
"status": "affected",
"version": "10.1.0"
},
{
"status": "affected",
"version": "10.2.0"
},
{
"status": "affected",
"version": "10.3.0"
},
{
"status": "affected",
"version": "10.3.1"
},
{
"status": "affected",
"version": "10.3.2"
},
{
"status": "affected",
"version": "10.4.0"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Deployment Kit",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Spotfire Desktop",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.12.0"
},
{
"status": "affected",
"version": "7.13.0"
},
{
"status": "affected",
"version": "7.14.0"
},
{
"status": "affected",
"version": "10.0.0"
},
{
"status": "affected",
"version": "10.1.0"
},
{
"status": "affected",
"version": "10.2.0"
},
{
"status": "affected",
"version": "10.3.0"
},
{
"status": "affected",
"version": "10.3.1"
},
{
"status": "affected",
"version": "10.3.2"
},
{
"status": "affected",
"version": "10.4.0"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop Language Packs",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-17T20:55:16",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2019-12-17T17:00:00Z",
"ID": "CVE-2019-17334",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analyst",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
},
{
"version_affected": "=",
"version_value": "7.12.0"
},
{
"version_affected": "=",
"version_value": "7.13.0"
},
{
"version_affected": "=",
"version_value": "7.14.0"
},
{
"version_affected": "=",
"version_value": "10.0.0"
},
{
"version_affected": "=",
"version_value": "10.1.0"
},
{
"version_affected": "=",
"version_value": "10.2.0"
},
{
"version_affected": "=",
"version_value": "10.3.0"
},
{
"version_affected": "=",
"version_value": "10.3.1"
},
{
"version_affected": "=",
"version_value": "10.3.2"
},
{
"version_affected": "=",
"version_value": "10.4.0"
},
{
"version_affected": "=",
"version_value": "10.5.0"
},
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Deployment Kit",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
},
{
"version_affected": "=",
"version_value": "7.12.0"
},
{
"version_affected": "=",
"version_value": "7.13.0"
},
{
"version_affected": "=",
"version_value": "7.14.0"
},
{
"version_affected": "=",
"version_value": "10.0.0"
},
{
"version_affected": "=",
"version_value": "10.1.0"
},
{
"version_affected": "=",
"version_value": "10.2.0"
},
{
"version_affected": "=",
"version_value": "10.3.0"
},
{
"version_affected": "=",
"version_value": "10.3.1"
},
{
"version_affected": "=",
"version_value": "10.3.2"
},
{
"version_affected": "=",
"version_value": "10.4.0"
},
{
"version_affected": "=",
"version_value": "10.5.0"
},
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
},
{
"name": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334",
"refsource": "MISC",
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2019-17334",
"datePublished": "2019-12-17T20:55:17.037330Z",
"dateReserved": "2019-10-07T00:00:00",
"dateUpdated": "2024-09-16T18:39:10.409Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-3181 (GCVE-0-2017-3181)
Vulnerability from cvelistv5 – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Summary
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO | Spotfire Analyst |
Affected:
7.7.0
|
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:16:28.244Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"name": "95696",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "https://www.securityfocus.com/bid/95696"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Spotfire Analyst",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Connectors",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
}
]
},
{
"product": "Spotfire Deployment Kit",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop Developer Edition",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop Language Packs",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Web Player Client",
"vendor": "TIBCO",
"versions": [
{
"status": "unknown",
"version": "N/A"
}
]
},
{
"product": "Spotfire Client",
"vendor": "TIBCO",
"versions": [
{
"status": "unknown",
"version": "N/A"
}
]
}
],
"datePublic": "2017-01-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-24T14:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"name": "95696",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "https://www.securityfocus.com/bid/95696"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2017-3181",
"STATE": "PUBLIC",
"TITLE": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Connectors",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
}
]
}
},
{
"product_name": "Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Developer Edition",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Web Player Client",
"version": {
"version_data": [
{
"affected": "?",
"version_affected": "?",
"version_value": "N/A"
}
]
}
},
{
"product_name": "Spotfire Client",
"version": {
"version_data": [
{
"affected": "?",
"version_affected": "?",
"version_value": "N/A"
}
]
}
}
]
},
"vendor_name": "TIBCO"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"name": "95696",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/95696"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2017-3181",
"datePublished": "2018-07-24T15:00:00",
"dateReserved": "2016-12-05T00:00:00",
"dateUpdated": "2024-08-05T14:16:28.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-3180 (GCVE-0-2017-3180)
Vulnerability from cvelistv5 – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO | Silver Fabric Enabler for Spotfire Web Player |
Affected:
2.1.2 , ≤ 2.1.2
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:16:28.225Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"name": "95699",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "https://www.securityfocus.com/bid/95699"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Silver Fabric Enabler for Spotfire Web Player ",
"vendor": "TIBCO",
"versions": [
{
"lessThanOrEqual": "2.1.2",
"status": "affected",
"version": "2.1.2",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Analyst",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO",
"versions": [
{
"lessThanOrEqual": "7.0.2",
"status": "affected",
"version": "7.0.2",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Automation Services 6",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Connectors",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
}
]
},
{
"product": "Spotfire Deployment Kit",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Desktop",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"lessThanOrEqual": "6.5.2",
"status": "affected",
"version": "6.5.2",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Desktop Developer Edition",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop Language Packs",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"lessThanOrEqual": "7.0.1",
"status": "affected",
"version": "7.0.1",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Professional",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Web Player",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
}
],
"datePublic": "2017-01-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-24T14:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"name": "95699",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "https://www.securityfocus.com/bid/95699"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2017-3180",
"STATE": "PUBLIC",
"TITLE": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Silver Fabric Enabler for Spotfire Web Player ",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "2.1.2",
"version_value": "2.1.2"
}
]
}
},
{
"product_name": "Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "7.0.2",
"version_value": "7.0.2"
}
]
}
},
{
"product_name": "Spotfire Automation Services 6",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
}
]
}
},
{
"product_name": "Spotfire Connectors",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
}
]
}
},
{
"product_name": "Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.2",
"version_value": "6.5.2"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Developer Edition",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "7.0.1",
"version_value": "7.0.1"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Professional",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
}
]
}
},
{
"product_name": "Spotfire Web Player",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
}
]
}
}
]
},
"vendor_name": "TIBCO"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180",
"refsource": "CONFIRM",
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"name": "95699",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/95699"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2017-3180",
"datePublished": "2018-07-24T15:00:00",
"dateReserved": "2016-12-05T00:00:00",
"dateUpdated": "2024-08-05T14:16:28.225Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-5437 (GCVE-0-2018-5437)
Vulnerability from cvelistv5 – Published: 2018-06-27 16:00 – Updated: 2024-09-17 01:25
VLAI?
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
Severity ?
6.8 (Medium)
CWE
- The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analyst |
Affected:
unspecified , ≤ 7.8.0
(custom)
Affected: 7.9.0 Affected: 7.9.1 Affected: 7.10.0 Affected: 7.10.1 Affected: 7.11.0 Affected: 7.12.0 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:44.438Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analyst",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.12.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Spotfire Deployment Kit",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop Language Packs",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
}
]
}
],
"datePublic": "2018-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-29T15:57:01",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. When upgrading to one of the new versions some previously working functionality will be disabled by default and require configuration. Please review the README and other documentation for further information. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Product Family Information Disclosure Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2018-06-26T16:00:00.000Z",
"ID": "CVE-2018-5437",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Product Family Information Disclosure Vulnerability",
"UPDATED": "2018-06-28T18:00:00.000Z"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. When upgrading to one of the new versions some previously working functionality will be disabled by default and require configuration. Please review the README and other documentation for further information. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2018-5437",
"datePublished": "2018-06-27T16:00:00Z",
"dateReserved": "2018-01-12T00:00:00",
"dateUpdated": "2024-09-17T01:25:43.883Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-5435 (GCVE-0-2018-5435)
Vulnerability from cvelistv5 – Published: 2018-06-27 16:00 – Updated: 2024-09-16 19:51
VLAI?
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
Severity ?
9.6 (Critical)
CWE
- The impact of this vulnerability includes the theoretical possibility that an unprivileged remote attacker could execute code with the privileges of the user account running the affected component.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analyst |
Affected:
unspecified , ≤ 7.8.0
(custom)
Affected: 7.9.0 Affected: 7.9.1 Affected: 7.10.0 Affected: 7.10.1 Affected: 7.11.0 Affected: 7.12.0 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:44.385Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analyst",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.12.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Spotfire Deployment Kit",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop Language Packs",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
}
]
}
],
"datePublic": "2018-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibility that an unprivileged remote attacker could execute code with the privileges of the user account running the affected component.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-29T15:57:01",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Product Family Remote Code Execution Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2018-06-26T16:00:00.000Z",
"ID": "CVE-2018-5435",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Product Family Remote Code Execution Vulnerability",
"UPDATED": "2018-06-28T18:00:00.000Z"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibility that an unprivileged remote attacker could execute code with the privileges of the user account running the affected component."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
},
{
"name": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2018-5435",
"datePublished": "2018-06-27T16:00:00Z",
"dateReserved": "2018-01-12T00:00:00",
"dateUpdated": "2024-09-16T19:51:48.227Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-4554 (GCVE-0-2015-4554)
Vulnerability from cvelistv5 – Published: 2015-07-21 19:00 – Updated: 2024-08-06 06:18
VLAI?
Summary
Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:18:12.051Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1033015",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033015"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-07-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-20T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1033015",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033015"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-4554",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1033015",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033015"
},
{
"name": "http://www.tibco.com/mk/advisory.jsp",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"name": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-4554",
"datePublished": "2015-07-21T19:00:00",
"dateReserved": "2015-06-14T00:00:00",
"dateUpdated": "2024-08-06T06:18:12.051Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-17334 (GCVE-0-2019-17334)
Vulnerability from nvd – Published: 2019-12-17 20:55 – Updated: 2024-09-16 18:39
VLAI?
Summary
The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below.
Severity ?
7.6 (High)
CWE
- The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analyst |
Affected:
unspecified , ≤ 7.11.1
(custom)
Affected: 7.12.0 Affected: 7.13.0 Affected: 7.14.0 Affected: 10.0.0 Affected: 10.1.0 Affected: 10.2.0 Affected: 10.3.0 Affected: 10.3.1 Affected: 10.3.2 Affected: 10.4.0 Affected: 10.5.0 Affected: 10.6.0 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:40:14.457Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analyst",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.12.0"
},
{
"status": "affected",
"version": "7.13.0"
},
{
"status": "affected",
"version": "7.14.0"
},
{
"status": "affected",
"version": "10.0.0"
},
{
"status": "affected",
"version": "10.1.0"
},
{
"status": "affected",
"version": "10.2.0"
},
{
"status": "affected",
"version": "10.3.0"
},
{
"status": "affected",
"version": "10.3.1"
},
{
"status": "affected",
"version": "10.3.2"
},
{
"status": "affected",
"version": "10.4.0"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Deployment Kit",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Spotfire Desktop",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.12.0"
},
{
"status": "affected",
"version": "7.13.0"
},
{
"status": "affected",
"version": "7.14.0"
},
{
"status": "affected",
"version": "10.0.0"
},
{
"status": "affected",
"version": "10.1.0"
},
{
"status": "affected",
"version": "10.2.0"
},
{
"status": "affected",
"version": "10.3.0"
},
{
"status": "affected",
"version": "10.3.1"
},
{
"status": "affected",
"version": "10.3.2"
},
{
"status": "affected",
"version": "10.4.0"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop Language Packs",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-17T20:55:16",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2019-12-17T17:00:00Z",
"ID": "CVE-2019-17334",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Analyst and Desktop Remote Code Execution Via Shared Files"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analyst",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
},
{
"version_affected": "=",
"version_value": "7.12.0"
},
{
"version_affected": "=",
"version_value": "7.13.0"
},
{
"version_affected": "=",
"version_value": "7.14.0"
},
{
"version_affected": "=",
"version_value": "10.0.0"
},
{
"version_affected": "=",
"version_value": "10.1.0"
},
{
"version_affected": "=",
"version_value": "10.2.0"
},
{
"version_affected": "=",
"version_value": "10.3.0"
},
{
"version_affected": "=",
"version_value": "10.3.1"
},
{
"version_affected": "=",
"version_value": "10.3.2"
},
{
"version_affected": "=",
"version_value": "10.4.0"
},
{
"version_affected": "=",
"version_value": "10.5.0"
},
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Deployment Kit",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
},
{
"version_affected": "=",
"version_value": "7.12.0"
},
{
"version_affected": "=",
"version_value": "7.13.0"
},
{
"version_affected": "=",
"version_value": "7.14.0"
},
{
"version_affected": "=",
"version_value": "10.0.0"
},
{
"version_affected": "=",
"version_value": "10.1.0"
},
{
"version_affected": "=",
"version_value": "10.2.0"
},
{
"version_affected": "=",
"version_value": "10.3.0"
},
{
"version_affected": "=",
"version_value": "10.3.1"
},
{
"version_affected": "=",
"version_value": "10.3.2"
},
{
"version_affected": "=",
"version_value": "10.4.0"
},
{
"version_affected": "=",
"version_value": "10.5.0"
},
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.1"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Visualizations component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contains a vulnerability that theoretically allows an attacker with permission to write DXP files to the Spotfire library to remotely execute code of their choice on the user account of other users who access the affected system. This attack is a risk only when the attacker has write access to a network file system shared with the affected system. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0, TIBCO Spotfire Deployment Kit: versions 7.11.1 and below, TIBCO Spotfire Desktop: versions 7.11.1 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2, versions 10.4.0, 10.5.0, and 10.6.0, and TIBCO Spotfire Desktop Language Packs: versions 7.11.1 and below."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibility that the attacker gains full control of the user account that accesses affected system."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
},
{
"name": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334",
"refsource": "MISC",
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17334"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analyst versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Analyst versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Analyst versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.11.1 and below update to version 7.11.2 or higher\nTIBCO Spotfire Desktop versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.3.1, and 10.3.2 update to version 10.3.3 or higher\nTIBCO Spotfire Desktop versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.11.1 and below update to version 7.11.2 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2019-17334",
"datePublished": "2019-12-17T20:55:17.037330Z",
"dateReserved": "2019-10-07T00:00:00",
"dateUpdated": "2024-09-16T18:39:10.409Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-3181 (GCVE-0-2017-3181)
Vulnerability from nvd – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Summary
Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO | Spotfire Analyst |
Affected:
7.7.0
|
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:16:28.244Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"name": "95696",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "https://www.securityfocus.com/bid/95696"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Spotfire Analyst",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Connectors",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
}
]
},
{
"product": "Spotfire Deployment Kit",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop Developer Edition",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop Language Packs",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Web Player Client",
"vendor": "TIBCO",
"versions": [
{
"status": "unknown",
"version": "N/A"
}
]
},
{
"product": "Spotfire Client",
"vendor": "TIBCO",
"versions": [
{
"status": "unknown",
"version": "N/A"
}
]
}
],
"datePublic": "2017-01-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-24T14:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"name": "95696",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "https://www.securityfocus.com/bid/95696"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2017-3181",
"STATE": "PUBLIC",
"TITLE": "Multiple TIBCO Spotfire components are vulnerable to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Connectors",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
}
]
}
},
{
"product_name": "Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Developer Edition",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Web Player Client",
"version": {
"version_data": [
{
"affected": "?",
"version_affected": "?",
"version_value": "N/A"
}
]
}
},
{
"product_name": "Spotfire Client",
"version": {
"version_data": [
{
"affected": "?",
"version_affected": "?",
"version_value": "N/A"
}
]
}
}
]
},
"vendor_name": "TIBCO"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3181"
},
{
"name": "95696",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/95696"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2017-3181",
"datePublished": "2018-07-24T15:00:00",
"dateReserved": "2016-12-05T00:00:00",
"dateUpdated": "2024-08-05T14:16:28.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-3180 (GCVE-0-2017-3180)
Vulnerability from nvd – Published: 2018-07-24 15:00 – Updated: 2024-08-05 14:16
VLAI?
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO | Silver Fabric Enabler for Spotfire Web Player |
Affected:
2.1.2 , ≤ 2.1.2
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:16:28.225Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"name": "95699",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "https://www.securityfocus.com/bid/95699"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Silver Fabric Enabler for Spotfire Web Player ",
"vendor": "TIBCO",
"versions": [
{
"lessThanOrEqual": "2.1.2",
"status": "affected",
"version": "2.1.2",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Analyst",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO",
"versions": [
{
"lessThanOrEqual": "7.0.2",
"status": "affected",
"version": "7.0.2",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Automation Services 6",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Connectors",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.6.0"
}
]
},
{
"product": "Spotfire Deployment Kit",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Desktop",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"lessThanOrEqual": "6.5.2",
"status": "affected",
"version": "6.5.2",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Desktop Developer Edition",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.7.0"
}
]
},
{
"product": "Spotfire Desktop Language Packs",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.5.0"
},
{
"status": "affected",
"version": "7.6.0"
},
{
"status": "affected",
"version": "7.7.0"
},
{
"lessThanOrEqual": "7.0.1",
"status": "affected",
"version": "7.0.1",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Professional",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
},
{
"product": "Spotfire Web Player",
"vendor": "TIBCO",
"versions": [
{
"status": "affected",
"version": "7.0.0"
},
{
"status": "affected",
"version": "7.0.1"
},
{
"lessThanOrEqual": "6.5.3",
"status": "affected",
"version": "6.5.3",
"versionType": "custom"
}
]
}
],
"datePublic": "2017-01-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-24T14:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"name": "95699",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "https://www.securityfocus.com/bid/95699"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2017-3180",
"STATE": "PUBLIC",
"TITLE": "Multiple TIBCO Spotfire components fail to sanitize user-supplied inout and are vulnerable to cross-site scripting"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Silver Fabric Enabler for Spotfire Web Player ",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "2.1.2",
"version_value": "2.1.2"
}
]
}
},
{
"product_name": "Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "7.0.2",
"version_value": "7.0.2"
}
]
}
},
{
"product_name": "Spotfire Automation Services 6",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
}
]
}
},
{
"product_name": "Spotfire Connectors",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
}
]
}
},
{
"product_name": "Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.2",
"version_value": "6.5.2"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Developer Edition",
"version": {
"version_data": [
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "7.0.1",
"version_value": "7.0.1"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.5.0",
"version_value": "7.5.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.6.0",
"version_value": "7.6.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.7.0",
"version_value": "7.7.0"
}
]
}
},
{
"product_name": "Spotfire Professional",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
}
]
}
},
{
"product_name": "Spotfire Web Player",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_name": "6.5.3",
"version_value": "6.5.3"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.0",
"version_value": "7.0.0"
},
{
"affected": "=",
"version_affected": "=",
"version_name": "7.0.1",
"version_value": "7.0.1"
}
]
}
}
]
},
"vendor_name": "TIBCO"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180",
"refsource": "CONFIRM",
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
},
{
"name": "95699",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/95699"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2017-3180",
"datePublished": "2018-07-24T15:00:00",
"dateReserved": "2016-12-05T00:00:00",
"dateUpdated": "2024-08-05T14:16:28.225Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-5437 (GCVE-0-2018-5437)
Vulnerability from nvd – Published: 2018-06-27 16:00 – Updated: 2024-09-17 01:25
VLAI?
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
Severity ?
6.8 (Medium)
CWE
- The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analyst |
Affected:
unspecified , ≤ 7.8.0
(custom)
Affected: 7.9.0 Affected: 7.9.1 Affected: 7.10.0 Affected: 7.10.1 Affected: 7.11.0 Affected: 7.12.0 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:44.438Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analyst",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.12.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Spotfire Deployment Kit",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop Language Packs",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
}
]
}
],
"datePublic": "2018-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-29T15:57:01",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. When upgrading to one of the new versions some previously working functionality will be disabled by default and require configuration. Please review the README and other documentation for further information. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Product Family Information Disclosure Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2018-06-26T16:00:00.000Z",
"ID": "CVE-2018-5437",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Product Family Information Disclosure Vulnerability",
"UPDATED": "2018-06-28T18:00:00.000Z"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for unauthorized information disclosure. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibly that an authenticated user could gain access to additional confidential information, including credentials to access additional resources."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5437"
},
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. When upgrading to one of the new versions some previously working functionality will be disabled by default and require configuration. Please review the README and other documentation for further information. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2018-5437",
"datePublished": "2018-06-27T16:00:00Z",
"dateReserved": "2018-01-12T00:00:00",
"dateUpdated": "2024-09-17T01:25:43.883Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-5435 (GCVE-0-2018-5435)
Vulnerability from nvd – Published: 2018-06-27 16:00 – Updated: 2024-09-16 19:51
VLAI?
Summary
The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0.
Severity ?
9.6 (Critical)
CWE
- The impact of this vulnerability includes the theoretical possibility that an unprivileged remote attacker could execute code with the privileges of the user account running the affected component.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analyst |
Affected:
unspecified , ≤ 7.8.0
(custom)
Affected: 7.9.0 Affected: 7.9.1 Affected: 7.10.0 Affected: 7.10.1 Affected: 7.11.0 Affected: 7.12.0 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:44.385Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analyst",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.12.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Spotfire Deployment Kit",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
},
{
"status": "affected",
"version": "7.12.0"
}
]
},
{
"product": "TIBCO Spotfire Desktop Language Packs",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.8.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.9.0"
},
{
"status": "affected",
"version": "7.9.1"
},
{
"status": "affected",
"version": "7.10.0"
},
{
"status": "affected",
"version": "7.10.1"
},
{
"status": "affected",
"version": "7.11.0"
}
]
}
],
"datePublic": "2018-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibility that an unprivileged remote attacker could execute code with the privileges of the user account running the affected component.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-29T15:57:01",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Product Family Remote Code Execution Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2018-06-26T16:00:00.000Z",
"ID": "CVE-2018-5435",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Product Family Remote Code Execution Vulnerability",
"UPDATED": "2018-06-28T18:00:00.000Z"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analyst",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Deployment Kit",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.12.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Desktop Language Packs",
"version": {
"version_data": [
{
"affected": "\u003c=",
"version_affected": "\u003c=",
"version_value": "7.8.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.9.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.0"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.10.1"
},
{
"affected": "=",
"version_affected": "=",
"version_value": "7.11.0"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TIBCO Spotfire Client and TIBCO Spotfire Web Player Client components of TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Deployment Kit, TIBCO Spotfire Desktop, and TIBCO Spotfire Desktop Language Packs contain multiple vulnerabilities that may allow for remote code execution. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analyst: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0; 7.12.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions up to and including 7.12.0, TIBCO Spotfire Deployment Kit: versions up to and including 7.8.0; 7.9.0;7.9.1;7.10.0;7.10.1;7.11.0; 7.12.0, TIBCO Spotfire Desktop: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0;7.12.0, TIBCO Spotfire Desktop Language Packs: versions up to and including 7.8.0; 7.9.0; 7.9.1; 7.10.0; 7.10.1; 7.11.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibility that an unprivileged remote attacker could execute code with the privileges of the user account running the affected component."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
},
{
"name": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2018/06/tibco-security-advisory-june-26-2018-tibco-spotfire-2018-5435"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO Spotfire Analyst versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Analyst versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Analyst versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Analyst version 7.11.0 update to version 7.11.1\nTIBCO Spotfire Analyst version 7.12.0 update to version 7.13.0\nTIBCO Spotfire Analytics Platform for AWS Marketplace versions 7.12.0 and below update to version 7.13.0 or higher\nTIBCO Spotfire Deployment Kit versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Deployment Kit versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Deployment Kit versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Deployment Kit version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Deployment Kit version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop version 7.11.0 update to version 7.11.1 or higher\nTIBCO Spotfire Desktop version 7.12.0 update to version 7.13.0 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.8.0 and below update to version 7.8.1 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.9.0 and 7.9.1 update to version 7.9.2 or higher\nTIBCO Spotfire Desktop Language Packs versions 7.10.0 and 7.10.1 update to version 7.10.2 or higher\nTIBCO Spotfire Desktop Language Packs version 7.11.0 update to version 7.11.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2018-5435",
"datePublished": "2018-06-27T16:00:00Z",
"dateReserved": "2018-01-12T00:00:00",
"dateUpdated": "2024-09-16T19:51:48.227Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-4554 (GCVE-0-2015-4554)
Vulnerability from nvd – Published: 2015-07-21 19:00 – Updated: 2024-08-06 06:18
VLAI?
Summary
Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:18:12.051Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1033015",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033015"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-07-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-20T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1033015",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033015"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-4554",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in TIBCO Spotfire Client and Spotfire Web Player Client in Spotfire Analyst before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Analytics Platform for AWS 6.5 and 7.0.x before 7.0.1; Spotfire Automation Services before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Deployment Kit before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Desktop before 6.5.2 and 7.0.x before 7.0.1; Spotfire Desktop Language Packs 7.0.x before 7.0.1; Spotfire Professional before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; Spotfire Web Player before 5.5.2, 6.0.x before 6.0.3, 6.5.x before 6.5.3, and 7.0.x before 7.0.1; and Silver Fabric Enabler for Spotfire Web Player before 2.1.1 allow remote attackers to execute arbitrary code or obtain sensitive information via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1033015",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033015"
},
{
"name": "http://www.tibco.com/mk/advisory.jsp",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"name": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/assets/blt1fd126faba191a9f/2015-001-advisory.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-4554",
"datePublished": "2015-07-21T19:00:00",
"dateReserved": "2015-06-14T00:00:00",
"dateUpdated": "2024-08-06T06:18:12.051Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}