CNVD-2020-12705

Vulnerability from cnvd - Published: 2020-02-19
VLAI Severity ?
Title
TIBCO Spotfire Analytics Platform for AWS Marketplace和TIBCO Spotfire Server跨站脚本漏洞
Description
TIBCO Spotfire Analytics Platform for AWS Marketplace是一套为在线软件商店AWS Marketplace提供数据可视化分析的平台。TIBCO Spotfire Server是一款智能、安全、灵活且可扩展的工具,可提供数据可视化、发现、整理和预测分析功能。 TIBCO Spotfire Analytics Platform for AWS Marketplace和TIBCO Spotfire Server的Spotfire library组件存在跨站脚本漏洞,攻击者可利用该漏洞执行客户端代码。
Severity
Patch Name
TIBCO Spotfire Analytics Platform for AWS Marketplace和TIBCO Spotfire Server跨站脚本漏洞的补丁
Patch Description
TIBCO Spotfire Analytics Platform for AWS Marketplace是一套为在线软件商店AWS Marketplace提供数据可视化分析的平台。TIBCO Spotfire Server是一款智能、安全、灵活且可扩展的工具,可提供数据可视化、发现、整理和预测分析功能。 TIBCO Spotfire Analytics Platform for AWS Marketplace和TIBCO Spotfire Server的Spotfire library组件存在跨站脚本漏洞,攻击者可利用该漏洞执行客户端代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17337

Reference
https://nvd.nist.gov/vuln/detail/CVE-2019-17337
Impacted products
Name
['TIBCO Spotfire Server <=7.11.7', 'TIBCO Spotfire Server 7.12.0', 'TIBCO Spotfire Server 7.13.0', 'TIBCO Spotfire Server 7.14.0', 'TIBCO Spotfire Server 10.0.0', 'TIBCO Spotfire Server 10.0.1', 'TIBCO Spotfire Server 10.1.0', 'TIBCO Spotfire Server 10.2.0', 'TIBCO Spotfire Server 10.2.1', 'TIBCO Spotfire Server 10.3.0', 'TIBCO Spotfire Server 10.3.1', 'TIBCO Spotfire Server 10.3.2', 'TIBCO Spotfire Server 10.3.3', 'TIBCO Spotfire Server 10.3.4', 'TIBCO Spotfire Server 10.4.0', 'TIBCO Spotfire Server 10.5.0', 'TIBCO Spotfire Server 10.6.0', 'TIBCO Spotfire Analytics Platform for AWS Marketplace 10.6.0']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-17337",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-17337"
    }
  },
  "description": "TIBCO Spotfire Analytics Platform for AWS Marketplace\u662f\u4e00\u5957\u4e3a\u5728\u7ebf\u8f6f\u4ef6\u5546\u5e97AWS Marketplace\u63d0\u4f9b\u6570\u636e\u53ef\u89c6\u5316\u5206\u6790\u7684\u5e73\u53f0\u3002TIBCO Spotfire Server\u662f\u4e00\u6b3e\u667a\u80fd\u3001\u5b89\u5168\u3001\u7075\u6d3b\u4e14\u53ef\u6269\u5c55\u7684\u5de5\u5177\uff0c\u53ef\u63d0\u4f9b\u6570\u636e\u53ef\u89c6\u5316\u3001\u53d1\u73b0\u3001\u6574\u7406\u548c\u9884\u6d4b\u5206\u6790\u529f\u80fd\u3002\n\nTIBCO Spotfire Analytics Platform for AWS Marketplace\u548cTIBCO Spotfire Server\u7684Spotfire library\u7ec4\u4ef6\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u5ba2\u6237\u7aef\u4ee3\u7801\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17337",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-12705",
  "openTime": "2020-02-19",
  "patchDescription": "TIBCO Spotfire Analytics Platform for AWS Marketplace\u662f\u4e00\u5957\u4e3a\u5728\u7ebf\u8f6f\u4ef6\u5546\u5e97AWS Marketplace\u63d0\u4f9b\u6570\u636e\u53ef\u89c6\u5316\u5206\u6790\u7684\u5e73\u53f0\u3002TIBCO Spotfire Server\u662f\u4e00\u6b3e\u667a\u80fd\u3001\u5b89\u5168\u3001\u7075\u6d3b\u4e14\u53ef\u6269\u5c55\u7684\u5de5\u5177\uff0c\u53ef\u63d0\u4f9b\u6570\u636e\u53ef\u89c6\u5316\u3001\u53d1\u73b0\u3001\u6574\u7406\u548c\u9884\u6d4b\u5206\u6790\u529f\u80fd\u3002\r\n\r\nTIBCO Spotfire Analytics Platform for AWS Marketplace\u548cTIBCO Spotfire Server\u7684Spotfire library\u7ec4\u4ef6\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u5ba2\u6237\u7aef\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "TIBCO Spotfire Analytics Platform for AWS Marketplace\u548cTIBCO Spotfire Server\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "TIBCO Spotfire Server \u003c=7.11.7",
      "TIBCO Spotfire Server 7.12.0",
      "TIBCO Spotfire Server 7.13.0",
      "TIBCO Spotfire Server 7.14.0",
      "TIBCO Spotfire Server 10.0.0",
      "TIBCO Spotfire Server 10.0.1",
      "TIBCO Spotfire Server 10.1.0",
      "TIBCO Spotfire Server 10.2.0",
      "TIBCO Spotfire Server 10.2.1",
      "TIBCO Spotfire Server 10.3.0",
      "TIBCO Spotfire Server 10.3.1",
      "TIBCO Spotfire Server 10.3.2",
      "TIBCO Spotfire Server 10.3.3",
      "TIBCO Spotfire Server 10.3.4",
      "TIBCO Spotfire Server 10.4.0",
      "TIBCO Spotfire Server 10.5.0",
      "TIBCO Spotfire Server 10.6.0",
      "TIBCO Spotfire Analytics Platform for AWS Marketplace 10.6.0"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-17337",
  "serverity": "\u4e2d",
  "submitTime": "2019-12-18",
  "title": "TIBCO Spotfire Analytics Platform for AWS Marketplace\u548cTIBCO Spotfire Server\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…