CVE-2022-30576 (GCVE-0-2022-30576)
Vulnerability from cvelistv5 – Published: 2022-08-16 17:55 – Updated: 2024-09-17 00:40
VLAI?
Summary
The Web Console component of TIBCO Software Inc.'s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, and TIBCO Statistica Trial contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Data Science - Workbench: versions 14.0.0 and below, TIBCO Statistica: versions 14.0.0 and below, TIBCO Statistica - Estore Edition: versions 14.0.0 and below, and TIBCO Statistica Trial: versions 14.0.0 and below.
Severity ?
8.7 (High)
CWE
- Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user.
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TIBCO Software Inc. | TIBCO Data Science - Workbench |
Affected:
unspecified , ≤ 14.0.0
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:56:12.927Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "TIBCO Data Science - Workbench",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "14.0.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Statistica",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "14.0.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Statistica - Estore Edition",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "14.0.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "TIBCO Statistica Trial",
"vendor": "TIBCO Software Inc.",
"versions": [
{
"lessThanOrEqual": "14.0.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-08-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Web Console component of TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, and TIBCO Statistica Trial contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench: versions 14.0.0 and below, TIBCO Statistica: versions 14.0.0 and below, TIBCO Statistica - Estore Edition: versions 14.0.0 and below, and TIBCO Statistica Trial: versions 14.0.0 and below."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-16T18:06:52",
"orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"shortName": "tibco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/services/support/advisories"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576"
}
],
"solutions": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Data Science - Workbench versions 14.0.0 and below: update to version 14.0.1 or later\nTIBCO Statistica versions 14.0.0 and below: update to version 14.0.1 or later\nTIBCO Statistica - Estore Edition versions 14.0.0 and below: update to version 14.0.1 or later\nTIBCO Statistica Trial versions 14.0.0 and below: update to version 14.0.1 or later"
}
],
"source": {
"discovery": "Internal"
},
"title": "TIBCO Statistica Stored Cross Site Scripting (XSS) Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2022-08-16T17:00:00Z",
"ID": "CVE-2022-30576",
"STATE": "PUBLIC",
"TITLE": "TIBCO Statistica Stored Cross Site Scripting (XSS) Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "TIBCO Data Science - Workbench",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "14.0.0"
}
]
}
},
{
"product_name": "TIBCO Statistica",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "14.0.0"
}
]
}
},
{
"product_name": "TIBCO Statistica - Estore Edition",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "14.0.0"
}
]
}
},
{
"product_name": "TIBCO Statistica Trial",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "14.0.0"
}
]
}
}
]
},
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Web Console component of TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, and TIBCO Statistica Trial contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench: versions 14.0.0 and below, TIBCO Statistica: versions 14.0.0 and below, TIBCO Statistica - Estore Edition: versions 14.0.0 and below, and TIBCO Statistica Trial: versions 14.0.0 and below."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Successful execution of these vulnerabilities will result in an attacker being able to execute commands with the privileges of the affected user."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tibco.com/services/support/advisories",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/services/support/advisories"
},
{
"name": "https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576",
"refsource": "CONFIRM",
"url": "https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576"
}
]
},
"solution": [
{
"lang": "en",
"value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Data Science - Workbench versions 14.0.0 and below: update to version 14.0.1 or later\nTIBCO Statistica versions 14.0.0 and below: update to version 14.0.1 or later\nTIBCO Statistica - Estore Edition versions 14.0.0 and below: update to version 14.0.1 or later\nTIBCO Statistica Trial versions 14.0.0 and below: update to version 14.0.1 or later"
}
],
"source": {
"discovery": "Internal"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db",
"assignerShortName": "tibco",
"cveId": "CVE-2022-30576",
"datePublished": "2022-08-16T17:55:23.538875Z",
"dateReserved": "2022-05-11T00:00:00",
"dateUpdated": "2024-09-17T00:40:59.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:data_science_-_workbench:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"14.0.1\", \"matchCriteriaId\": \"D855A85D-14CE-4949-801F-6BF82ABA7FAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:statistica:*:*:*:*:-:*:*:*\", \"versionEndExcluding\": \"14.0.1\", \"matchCriteriaId\": \"0CD8E8BB-7888-425F-94B7-AABD551936D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:statistica:*:*:*:*:estore:*:*:*\", \"versionEndExcluding\": \"14.0.1\", \"matchCriteriaId\": \"FC6C3BB5-C22F-4093-AC97-77A4518583F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tibco:statistica:*:*:*:*:trial:*:*:*\", \"versionEndExcluding\": \"14.0.1\", \"matchCriteriaId\": \"6BC6763F-7A0A-4A07-858F-53BF7BF2C078\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Web Console component of TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, and TIBCO Statistica Trial contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench: versions 14.0.0 and below, TIBCO Statistica: versions 14.0.0 and below, TIBCO Statistica - Estore Edition: versions 14.0.0 and below, and TIBCO Statistica Trial: versions 14.0.0 and below.\"}, {\"lang\": \"es\", \"value\": \"El componente Web Console de TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, y TIBCO Statistica Trial contiene una vulnerabilidad f\\u00e1cilmente explotable que permite a un atacante poco privilegiado y acceso a la red ejecutar un ataque de tipo Cross Site Scripting (XSS) Almacenado en el sistema afectado. Un ataque con \\u00e9xito usando esta vulnerabilidad requiere una interacci\\u00f3n humana de una persona distinta al atacante. Las versiones afectadas son TIBCO Data Science - Workbench de TIBCO Software Inc.: versiones 14.0.0 y anteriores, TIBCO Statistica: versiones 14.0.0 y anteriores, TIBCO Statistica - Estore Edition: versiones 14.0.0 y anteriores, y TIBCO Statistica Trial: versiones 14.0.0 y anteriores.\"}]",
"id": "CVE-2022-30576",
"lastModified": "2024-11-21T07:02:57.837",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@tibco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 5.8}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}]}",
"published": "2022-08-16T18:15:08.843",
"references": "[{\"url\": \"https://www.tibco.com/services/support/advisories\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576\", \"source\": \"security@tibco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/services/support/advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@tibco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-30576\",\"sourceIdentifier\":\"security@tibco.com\",\"published\":\"2022-08-16T18:15:08.843\",\"lastModified\":\"2024-11-21T07:02:57.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Web Console component of TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, and TIBCO Statistica Trial contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench: versions 14.0.0 and below, TIBCO Statistica: versions 14.0.0 and below, TIBCO Statistica - Estore Edition: versions 14.0.0 and below, and TIBCO Statistica Trial: versions 14.0.0 and below.\"},{\"lang\":\"es\",\"value\":\"El componente Web Console de TIBCO Software Inc.\u0027s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, y TIBCO Statistica Trial contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante poco privilegiado y acceso a la red ejecutar un ataque de tipo Cross Site Scripting (XSS) Almacenado en el sistema afectado. Un ataque con \u00e9xito usando esta vulnerabilidad requiere una interacci\u00f3n humana de una persona distinta al atacante. Las versiones afectadas son TIBCO Data Science - Workbench de TIBCO Software Inc.: versiones 14.0.0 y anteriores, TIBCO Statistica: versiones 14.0.0 y anteriores, TIBCO Statistica - Estore Edition: versiones 14.0.0 y anteriores, y TIBCO Statistica Trial: versiones 14.0.0 y anteriores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@tibco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:data_science_-_workbench:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0.1\",\"matchCriteriaId\":\"D855A85D-14CE-4949-801F-6BF82ABA7FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:statistica:*:*:*:*:-:*:*:*\",\"versionEndExcluding\":\"14.0.1\",\"matchCriteriaId\":\"0CD8E8BB-7888-425F-94B7-AABD551936D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:statistica:*:*:*:*:estore:*:*:*\",\"versionEndExcluding\":\"14.0.1\",\"matchCriteriaId\":\"FC6C3BB5-C22F-4093-AC97-77A4518583F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tibco:statistica:*:*:*:*:trial:*:*:*\",\"versionEndExcluding\":\"14.0.1\",\"matchCriteriaId\":\"6BC6763F-7A0A-4A07-858F-53BF7BF2C078\"}]}]}],\"references\":[{\"url\":\"https://www.tibco.com/services/support/advisories\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576\",\"source\":\"security@tibco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/services/support/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…