FKIE_CVE-2017-3180

Vulnerability from fkie_nvd - Published: 2018-07-24 15:29 - Updated: 2024-11-21 03:24
Summary
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_web_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "173CF2F8-3802-4D0B-B825-518F22753246",
              "versionEndIncluding": "2.1.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CA67C3-1E04-4CF9-9DBF-5AAC32ED1BAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DE259A9-18D9-48D2-B1DF-E9244F6C79B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD36D84-B44B-48AA-9FD0-966DFBE5CFB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648B466E-6DDA-4A8E-BCD1-60A50B8E7680",
              "versionEndIncluding": "7.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CB0628A-9C75-4196-A28C-7C1B1A116C53",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0424905D-696E-4D5F-957E-9D360F03E296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BA7ABF1-F6DE-4908-9C09-8B523FD317A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE55C07-E141-4DEA-A9E2-B075E1F56449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27A296C-6D4A-405B-86BB-F7D383C656E8",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050885E-62BF-454F-A653-129269829390",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA0A8EB-9A3B-415F-9823-50C4AAD4C9AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F2A9DC-8D5F-4516-8581-0A719FEAC867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADE970A-E3D6-41AC-A3E6-9F49090A0445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E31011-0D3C-4339-86F0-81CD77BC3439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC24CB8-3411-438A-A99C-5DC0DD4A3128",
              "versionEndIncluding": "6.5.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "981372F8-3050-42BA-BF94-16478E4B04A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A19D3881-3807-4EB0-B07E-116393FAA836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "584E8D2D-E0D9-4886-81D4-B2A629884F34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12851913-2BAF-4B35-AD03-7C6B4A91C43E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF48FC-2634-4D66-8BD2-CB6D3CA04C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*",
              "matchCriteriaId": "CA0557E9-5277-4D60-A1C6-1DC24FD7ECE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894B719-865C-4EB3-B0E8-6853F1BC31A8",
              "versionEndIncluding": "7.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A26FF0F0-3126-4AF6-A1FA-C911FB429648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4FF6CF3-B05C-4014-83F5-3C44D09F4FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D9DCB1-D307-42D0-A5CB-904D5DCCCD91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF9238B-B335-4AC3-A866-A25D708CBE93",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D883BEDD-2A54-4D01-8322-E7804D1D057A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE1B65E-1DAF-43A4-B5AC-956ABA66A078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9D754F3-9358-4163-9999-23AB931AA790",
              "versionEndIncluding": "6.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C96AC0E-4C68-4CDD-A73F-3B19D2EEFE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1959D810-72DC-4B6A-8BD9-6B80C49A5315",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
    },
    {
      "lang": "es",
      "value": "M\u00faltiples productos TIBCO son propensos a m\u00faltiples vulnerabilidades sin especificar de Cross-Site Scripting (XSS) debido a que fracasan a la hora de sanear entradas proporcionadas por el usuario. Un atacante podr\u00eda aprovechar estos problemas para ejecutar c\u00f3digo script arbitrario en el navegador de un usuario incauto en el contexto del sitio afectado. Esto puede permitir que el atacante robe credenciales de autenticaci\u00f3n basadas en cookies y lance otros ataques. Los productos y versiones afectadas incluyen: TIBCO Silver Fabric Enabler for Spotfire Web Player en versiones 2.1.2 y anteriores; TIBCO Spotfire Analyst 7.5.0; TIBCO Spotfire Analyst 7.6.0; TIBCO Spotfire Analyst 7.7.0; TIBCO Spotfire Analytics Platform for AWS Marketplace en versiones 7.0.2 y anteriores; TIBCO Spotfire Automation Services en versiones 6.5.3 y anteriores; TIBCO Spotfire Automation Services 7.0.0 y 7.0.1; TIBCO Spotfire Connectors 7.6.0; TIBCO Spotfire Deployment Kit en versiones 6.5.3 y anteriores; TIBCO Spotfire Deployment Kit 7.0.0 y 7.0.1; TIBCO Spotfire Deployment Kit 7.5.0; TIBCO Spotfire Deployment Kit 7.6.0; TIBCO Spotfire Deployment Kit 7.7.0; TIBCO Spotfire Desktop en versiones 6.5.2 y anteriores; TIBCO Spotfire Desktop 7.0.0 y 7.0.1; TIBCO Spotfire Desktop 7.5.0; TIBCO Spotfire Desktop 7.6.0; TIBCO Spotfire Desktop 7.7.0; TIBCO Spotfire Desktop Developer Edition 7.7.0; TIBCO Spotfire Desktop Language Packs en versiones 7.0.1 y anteriores; TIBCO Spotfire Desktop Language Packs 7.5.0; TIBCO Spotfire Desktop Language Packs 7.6.0; TIBCO Spotfire Desktop Language Packs 7.7.0; TIBCO Spotfire Professional en versiones 6.5.3 y anteriores; TIBCO Spotfire Professional 7.0.0 y 7.0.1 TIBCO Spotfire Web Player en versiones 6.5.3 y anteriores; y TIBCO Spotfire Web Player 7.0.0 y 7.0.1."
    }
  ],
  "id": "CVE-2017-3180",
  "lastModified": "2024-11-21T03:24:58.687",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-24T15:29:00.327",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/bid/95699"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/bid/95699"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…