FKIE_CVE-2019-17335
Vulnerability from fkie_nvd - Published: 2019-12-17 21:15 - Updated: 2024-11-21 04:32
Severity ?
Summary
The Data access layer component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tibco | spotfire_analytics_platform_for_aws | 10.6.0 | |
| tibco | spotfire_server | * | |
| tibco | spotfire_server | 7.12.0 | |
| tibco | spotfire_server | 7.13.0 | |
| tibco | spotfire_server | 7.14.0 | |
| tibco | spotfire_server | 10.0.0 | |
| tibco | spotfire_server | 10.0.1 | |
| tibco | spotfire_server | 10.1.0 | |
| tibco | spotfire_server | 10.2.0 | |
| tibco | spotfire_server | 10.2.1 | |
| tibco | spotfire_server | 10.3.0 | |
| tibco | spotfire_server | 10.3.1 | |
| tibco | spotfire_server | 10.3.2 | |
| tibco | spotfire_server | 10.3.3 | |
| tibco | spotfire_server | 10.3.4 | |
| tibco | spotfire_server | 10.4.0 | |
| tibco | spotfire_server | 10.5.0 | |
| tibco | spotfire_server | 10.6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74725E74-1940-4DD4-ABC2-C417CE911A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62BF3477-0361-4F52-B900-BFC093EA911E",
"versionEndIncluding": "7.11.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F59A46F-9E34-4354-AB7D-73A253014BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:7.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97B691A6-B273-4880-AD61-53169C4C3CEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:7.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47E57AE2-D98C-4231-9E56-A5EE8B5BC0AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "933FA68E-688B-40E6-A49B-952C3CC7123C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55C0068C-761E-4B11-9FB3-D1F038B789D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5C854AEB-1870-4AC1-828C-BCDA9EC92956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5203DA4-7F5D-4221-9CC0-00FE30B6F388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62045408-6021-44AB-80DA-92D22D373F47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "121DE084-9E95-4768-872B-16B12DC421BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11F3CAA3-510B-400B-927E-8BEBB6DEFC9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B75EF05E-A26B-4DAA-8550-80119A12149A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6C6CF19F-CD9D-4174-B6D0-EE65DACCF8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "107D36D1-83C9-463E-B87D-B6CA67381EE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12B0BE70-96A5-40BA-B990-5C831EB2B043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2886371B-CDE7-4352-8F94-5455A6C0B59B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:spotfire_server:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5413400F-1A04-4340-B75A-9BFE1BD3FEC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Data access layer component of TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0."
},
{
"lang": "es",
"value": "El componente de capa de acceso Data de TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace y TIBCO Spotfire Server, contiene m\u00faltiples vulnerabilidades que te\u00f3ricamente permiten a un atacante acceder a los datos almacenados en cach\u00e9 desde una fuente de datos, o una parte de una fuente de datos, que el atacante no deber\u00eda tener acceso a. El atacante necesitar\u00eda privilegios para guardar un archivo de Spotfire en la biblioteca. Las versiones afectadas son TIBCO Software Inc.\u0027s TIBCO Spotfire Analytics Platform para AWS Marketplace: versi\u00f3n 10.6.0 y TIBCO Spotfire Server: versiones 7.11.7 y por debajo, versiones 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3 y 10.3.4, versiones 10.4.0, 10.5.0 y 10.6.0 ."
}
],
"id": "CVE-2019-17335",
"lastModified": "2024-11-21T04:32:06.637",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "security@tibco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-17T21:15:12.300",
"references": [
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.tibco.com/services/support/advisories"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.tibco.com/support/advisories/2019/12/tibco-security-advisory-december-17-2019-tibco-spotfire-2019-17335"
}
],
"sourceIdentifier": "security@tibco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…