CVE-2019-17336 (GCVE-0-2019-17336)
Vulnerability from cvelistv5 – Published: 2019-12-17 20:55 – Updated: 2024-09-17 02:06
VLAI?
Summary
The Data access layer component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to information that can lead to obtaining credentials used to access Spotfire data sources. The attacker would need privileges to save a Spotfire file to the library, and only applies in a situation where NTLM credentials, or a credentials profile is in use. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.
Severity ?
7.7 (High)
CWE
- The impact of this vulnerability includes the theoretical possibility that an attacker recovers credentials used to access Spotfire data sources.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Spotfire Analytics Platform for AWS Marketplace |
Affected:
10.6.0
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:40:14.527Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"status": "affected",
"version": "10.6.0"
}
]
},
{
"product": "TIBCO Spotfire Server",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "7.11.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"status": "affected",
"version": "7.12.0"
},
{
"status": "affected",
"version": "7.13.0"
},
{
"status": "affected",
"version": "7.14.0"
},
{
"status": "affected",
"version": "10.0.0"
},
{
"status": "affected",
"version": "10.0.1"
},
{
"status": "affected",
"version": "10.1.0"
},
{
"status": "affected",
"version": "10.2.0"
},
{
"status": "affected",
"version": "10.2.1"
},
{
"status": "affected",
"version": "10.3.0"
},
{
"status": "affected",
"version": "10.3.1"
},
{
"status": "affected",
"version": "10.3.2"
},
{
"status": "affected",
"version": "10.3.3"
},
{
"status": "affected",
"version": "10.3.4"
},
{
"status": "affected",
"version": "10.4.0"
},
{
"status": "affected",
"version": "10.5.0"
},
{
"status": "affected",
"version": "10.6.0"
}
]
}
],
"datePublic": "2019-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to information that can lead to obtaining credentials used to access Spotfire data sources. The attacker would need privileges to save a Spotfire file to the library, and only applies in a situation where NTLM credentials, or a credentials profile is in use. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "The impact of this vulnerability includes the theoretical possibility that an attacker recovers credentials used to access Spotfire data sources.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-17T20:55:17",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Server versions 7.11.7 and below update to version 7.11.8 or higher\nTIBCO Spotfire Server versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4 update to version 10.3.5 or higher\nTIBCO Spotfire Server versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "TIBCO Spotfire Web Player Potentially Exposes Credentials For Shared Data Sources",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2019-12-17T17:00:00Z",
"ID": "CVE-2019-17336",
"STATE": "PUBLIC",
"TITLE": "TIBCO Spotfire Web Player Potentially Exposes Credentials For Shared Data Sources"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
},
{
"product_name": "TIBCO Spotfire Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "7.11.7"
},
{
"version_affected": "=",
"version_value": "7.12.0"
},
{
"version_affected": "=",
"version_value": "7.13.0"
},
{
"version_affected": "=",
"version_value": "7.14.0"
},
{
"version_affected": "=",
"version_value": "10.0.0"
},
{
"version_affected": "=",
"version_value": "10.0.1"
},
{
"version_affected": "=",
"version_value": "10.1.0"
},
{
"version_affected": "=",
"version_value": "10.2.0"
},
{
"version_affected": "=",
"version_value": "10.2.1"
},
{
"version_affected": "=",
"version_value": "10.3.0"
},
{
"version_affected": "=",
"version_value": "10.3.1"
},
{
"version_affected": "=",
"version_value": "10.3.2"
},
{
"version_affected": "=",
"version_value": "10.3.3"
},
{
"version_affected": "=",
"version_value": "10.3.4"
},
{
"version_affected": "=",
"version_value": "10.4.0"
},
{
"version_affected": "=",
"version_value": "10.5.0"
},
{
"version_affected": "=",
"version_value": "10.6.0"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to information that can lead to obtaining credentials used to access Spotfire data sources. The attacker would need privileges to save a Spotfire file to the library, and only applies in a situation where NTLM credentials, or a credentials profile is in use. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "The impact of this vulnerability includes the theoretical possibility that an attacker recovers credentials used to access Spotfire data sources."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.tibco.com/services/support/advisories",
"refsource": "MISC",
"url": "http://www.tibco.com/services/support/advisories"
},
{
"name": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336",
"refsource": "MISC",
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Analytics Platform for AWS Marketplace version 10.6.0 update to version 10.6.1 or higher\nTIBCO Spotfire Server versions 7.11.7 and below update to version 7.11.8 or higher\nTIBCO Spotfire Server versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4 update to version 10.3.5 or higher\nTIBCO Spotfire Server versions 10.4.0, 10.5.0, and 10.6.0 update to version 10.6.1 or higher"
}
],
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2019-17336",
"datePublished": "2019-12-17T20:55:18.061334Z",
"dateReserved": "2019-10-07T00:00:00",
"dateUpdated": "2024-09-17T02:06:23.402Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74725E74-1940-4DD4-ABC2-C417CE911A83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.11.7\", \"matchCriteriaId\": \"62BF3477-0361-4F52-B900-BFC093EA911E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:7.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F59A46F-9E34-4354-AB7D-73A253014BA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:7.13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97B691A6-B273-4880-AD61-53169C4C3CEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:7.14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E57AE2-D98C-4231-9E56-A5EE8B5BC0AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"933FA68E-688B-40E6-A49B-952C3CC7123C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55C0068C-761E-4B11-9FB3-D1F038B789D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C854AEB-1870-4AC1-828C-BCDA9EC92956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5203DA4-7F5D-4221-9CC0-00FE30B6F388\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62045408-6021-44AB-80DA-92D22D373F47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"121DE084-9E95-4768-872B-16B12DC421BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11F3CAA3-510B-400B-927E-8BEBB6DEFC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B75EF05E-A26B-4DAA-8550-80119A12149A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C6CF19F-CD9D-4174-B6D0-EE65DACCF8EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"107D36D1-83C9-463E-B87D-B6CA67381EE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12B0BE70-96A5-40BA-B990-5C831EB2B043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2886371B-CDE7-4352-8F94-5455A6C0B59B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:spotfire_server:10.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5413400F-1A04-4340-B75A-9BFE1BD3FEC7\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to information that can lead to obtaining credentials used to access Spotfire data sources. The attacker would need privileges to save a Spotfire file to the library, and only applies in a situation where NTLM credentials, or a credentials profile is in use. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.\"}, {\"lang\": \"es\", \"value\": \"El componente de capa de acceso Data de TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace y TIBCO Spotfire Server, contiene m\\u00faltiples vulnerabilidades que te\\u00f3ricamente permiten a un atacante acceder a la informaci\\u00f3n que puede conllevar a una obtenci\\u00f3n de credenciales usadas para acceder a las fuentes de datos de Spotfire. El atacante necesitar\\u00eda privilegios para guardar un archivo de Spotfire en la biblioteca, y solo aplica en una situaci\\u00f3n en la que las credenciales NTLM o un perfil de credenciales est\\u00e1 en uso. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\\u00f3n 10.6.0 y TIBCO Spotfire Server: versiones 7.11.7 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3 y 10.3.4, versiones 10.4.0, 10.5.0 y 10.6.0.\"}]",
"id": "CVE-2019-17336",
"lastModified": "2024-11-21T04:32:06.763",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV30\": [{\"source\": \"security@tibco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\", \"baseScore\": 7.7, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.1, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-12-17T21:15:12.380",
"references": "[{\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.tibco.com/services/support/advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@tibco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-17336\",\"sourceIdentifier\":\"security@tibco.com\",\"published\":\"2019-12-17T21:15:12.380\",\"lastModified\":\"2024-11-21T04:32:06.763\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to information that can lead to obtaining credentials used to access Spotfire data sources. The attacker would need privileges to save a Spotfire file to the library, and only applies in a situation where NTLM credentials, or a credentials profile is in use. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.\"},{\"lang\":\"es\",\"value\":\"El componente de capa de acceso Data de TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace y TIBCO Spotfire Server, contiene m\u00faltiples vulnerabilidades que te\u00f3ricamente permiten a un atacante acceder a la informaci\u00f3n que puede conllevar a una obtenci\u00f3n de credenciales usadas para acceder a las fuentes de datos de Spotfire. El atacante necesitar\u00eda privilegios para guardar un archivo de Spotfire en la biblioteca, y solo aplica en una situaci\u00f3n en la que las credenciales NTLM o un perfil de credenciales est\u00e1 en uso. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\u00f3n 10.6.0 y TIBCO Spotfire Server: versiones 7.11.7 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3 y 10.3.4, versiones 10.4.0, 10.5.0 y 10.6.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"security@tibco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74725E74-1940-4DD4-ABC2-C417CE911A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.11.7\",\"matchCriteriaId\":\"62BF3477-0361-4F52-B900-BFC093EA911E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:7.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F59A46F-9E34-4354-AB7D-73A253014BA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:7.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B691A6-B273-4880-AD61-53169C4C3CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:7.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E57AE2-D98C-4231-9E56-A5EE8B5BC0AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"933FA68E-688B-40E6-A49B-952C3CC7123C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C0068C-761E-4B11-9FB3-D1F038B789D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C854AEB-1870-4AC1-828C-BCDA9EC92956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5203DA4-7F5D-4221-9CC0-00FE30B6F388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62045408-6021-44AB-80DA-92D22D373F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121DE084-9E95-4768-872B-16B12DC421BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F3CAA3-510B-400B-927E-8BEBB6DEFC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B75EF05E-A26B-4DAA-8550-80119A12149A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6CF19F-CD9D-4174-B6D0-EE65DACCF8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107D36D1-83C9-463E-B87D-B6CA67381EE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B0BE70-96A5-40BA-B990-5C831EB2B043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2886371B-CDE7-4352-8F94-5455A6C0B59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:spotfire_server:10.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5413400F-1A04-4340-B75A-9BFE1BD3FEC7\"}]}]}],\"references\":[{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.tibco.com/services/support/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…