CVE-2019-17335 (GCVE-0-2019-17335)

Vulnerability from cvelistv5 – Published: 2019-12-17 20:55 – Updated: 2024-09-16 20:58
VLAI?
Summary
The Data access layer component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.
CWE
  • The impact of this vulnerability includes the theoretical possibility that the attacker could gain unauthorized access to data that other users have recently viewed.
Assigner
Impacted products
Vendor Product Version
TIBCO Software Inc. TIBCO Spotfire Analytics Platform for AWS Marketplace Affected: 10.6.0
Create a notification for this product.
    TIBCO Software Inc. TIBCO Spotfire Server Affected: unspecified , ≤ 7.11.7 (custom)
Affected: 7.12.0
Affected: 7.13.0
Affected: 7.14.0
Affected: 10.0.0
Affected: 10.0.1
Affected: 10.1.0
Affected: 10.2.0
Affected: 10.2.1
Affected: 10.3.0
Affected: 10.3.1
Affected: 10.3.2
Affected: 10.3.3
Affected: 10.3.4
Affected: 10.4.0
Affected: 10.5.0
Affected: 10.6.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:40:14.503Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.tibco.com/services/support/advisories"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        },
        {
          "product": "TIBCO Spotfire Server",
          "vendor": "TIBCO Software Inc.",
          "versions": [
            {
              "lessThanOrEqual": "7.11.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "7.12.0"
            },
            {
              "status": "affected",
              "version": "7.13.0"
            },
            {
              "status": "affected",
              "version": "7.14.0"
            },
            {
              "status": "affected",
              "version": "10.0.0"
            },
            {
              "status": "affected",
              "version": "10.0.1"
            },
            {
              "status": "affected",
              "version": "10.1.0"
            },
            {
              "status": "affected",
              "version": "10.2.0"
            },
            {
              "status": "affected",
              "version": "10.2.1"
            },
            {
              "status": "affected",
              "version": "10.3.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            },
            {
              "status": "affected",
              "version": "10.3.2"
            },
            {
              "status": "affected",
              "version": "10.3.3"
            },
            {
              "status": "affected",
              "version": "10.3.4"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.5.0"
            },
            {
              "status": "affected",
              "version": "10.6.0"
            }
          ]
        }
      ],
      "datePublic": "2019-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "The impact of this vulnerability includes the theoretical possibility that the attacker could gain unauthorized access to data that other users have recently viewed.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-17T20:55:17",
        "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
        "shortName": "tibco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.tibco.com/services/support/advisories"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Server versions 7.11.7 and below update to version 7.11.8 or higher\nTIBCO Spotfire Server versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4 update to version 10.3.5 or higher\nTIBCO Spotfire Server versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "TIBCO Spotfire Server Exposes User-Specific Cached Data To Others Users",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@tibco.com",
          "DATE_PUBLIC": "2019-12-17T17:00:00Z",
          "ID": "CVE-2019-17335",
          "STATE": "PUBLIC",
          "TITLE": "TIBCO Spotfire Server Exposes User-Specific Cached Data To Others Users"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TIBCO Spotfire Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "7.11.7"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.12.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.13.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "7.14.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.0.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.0.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.1.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.2.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.2.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.3"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.3.4"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.4.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "10.6.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "TIBCO Software Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "The impact of this vulnerability includes the theoretical possibility that the attacker could gain unauthorized access to data that other users have recently viewed."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tibco.com/services/support/advisories",
              "refsource": "MISC",
              "url": "http://www.tibco.com/services/support/advisories"
            },
            {
              "name": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335",
              "refsource": "MISC",
              "url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Server versions 7.11.7 and below update to version 7.11.8 or higher\nTIBCO Spotfire Server versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4 update to version 10.3.5 or higher\nTIBCO Spotfire Server versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
    "assignerShortName": "tibco",
    "cveId": "CVE-2019-17335",
    "datePublished": "2019-12-17T20:55:17.568949Z",
    "dateReserved": "2019-10-07T00:00:00",
    "dateUpdated": "2024-09-16T20:58:01.616Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74725E74-1940-4DD4-ABC2-C417CE911A83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.11.7\", \"matchCriteriaId\": \"62BF3477-0361-4F52-B900-BFC093EA911E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:7.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F59A46F-9E34-4354-AB7D-73A253014BA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:7.13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97B691A6-B273-4880-AD61-53169C4C3CEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:7.14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E57AE2-D98C-4231-9E56-A5EE8B5BC0AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"933FA68E-688B-40E6-A49B-952C3CC7123C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55C0068C-761E-4B11-9FB3-D1F038B789D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C854AEB-1870-4AC1-828C-BCDA9EC92956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5203DA4-7F5D-4221-9CC0-00FE30B6F388\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62045408-6021-44AB-80DA-92D22D373F47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"121DE084-9E95-4768-872B-16B12DC421BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11F3CAA3-510B-400B-927E-8BEBB6DEFC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B75EF05E-A26B-4DAA-8550-80119A12149A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C6CF19F-CD9D-4174-B6D0-EE65DACCF8EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"107D36D1-83C9-463E-B87D-B6CA67381EE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12B0BE70-96A5-40BA-B990-5C831EB2B043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2886371B-CDE7-4352-8F94-5455A6C0B59B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5413400F-1A04-4340-B75A-9BFE1BD3FEC7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.\"}, {\"lang\": \"es\", \"value\": \"El componente de capa de acceso Data de TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace y TIBCO Spotfire Server, contiene m\\u00faltiples vulnerabilidades que te\\u00f3ricamente permiten a un atacante acceder a los datos almacenados en cach\\u00e9 desde una fuente de datos, o una parte de una fuente de datos, que el  atacante no deber\\u00eda tener acceso a. El atacante necesitar\\u00eda privilegios para guardar un archivo de Spotfire en la biblioteca. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\\u00f3n 10.6.0 y TIBCO Spotfire Server: versiones 7.11.7 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3 y 10.3.4, versiones 10.4.0, 10.5.0 y 10.6.0 .\"}]",
      "id": "CVE-2019-17335",
      "lastModified": "2024-11-21T04:32:06.637",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV30\": [{\"source\": \"security@tibco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-12-17T21:15:12.300",
      "references": "[{\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@tibco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-17335\",\"sourceIdentifier\":\"security@tibco.com\",\"published\":\"2019-12-17T21:15:12.300\",\"lastModified\":\"2024-11-21T04:32:06.637\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.\"},{\"lang\":\"es\",\"value\":\"El componente de capa de acceso Data de TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace y TIBCO Spotfire Server, contiene m\u00faltiples vulnerabilidades que te\u00f3ricamente permiten a un atacante acceder a los datos almacenados en cach\u00e9 desde una fuente de datos, o una parte de una fuente de datos, que el  atacante no deber\u00eda tener acceso a. El atacante necesitar\u00eda privilegios para guardar un archivo de Spotfire en la biblioteca. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\u00f3n 10.6.0 y TIBCO Spotfire Server: versiones 7.11.7 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3 y 10.3.4, versiones 10.4.0, 10.5.0 y 10.6.0 .\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"security@tibco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74725E74-1940-4DD4-ABC2-C417CE911A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.11.7\",\"matchCriteriaId\":\"62BF3477-0361-4F52-B900-BFC093EA911E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:7.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F59A46F-9E34-4354-AB7D-73A253014BA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:7.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B691A6-B273-4880-AD61-53169C4C3CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:7.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E57AE2-D98C-4231-9E56-A5EE8B5BC0AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"933FA68E-688B-40E6-A49B-952C3CC7123C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C0068C-761E-4B11-9FB3-D1F038B789D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C854AEB-1870-4AC1-828C-BCDA9EC92956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5203DA4-7F5D-4221-9CC0-00FE30B6F388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62045408-6021-44AB-80DA-92D22D373F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121DE084-9E95-4768-872B-16B12DC421BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F3CAA3-510B-400B-927E-8BEBB6DEFC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B75EF05E-A26B-4DAA-8550-80119A12149A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6CF19F-CD9D-4174-B6D0-EE65DACCF8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107D36D1-83C9-463E-B87D-B6CA67381EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B0BE70-96A5-40BA-B990-5C831EB2B043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2886371B-CDE7-4352-8F94-5455A6C0B59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5413400F-1A04-4340-B75A-9BFE1BD3FEC7\"}]}]}],\"references\":[{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…