diff --git a/2019/8xxx/CVE-2019-8987.json b/2019/8xxx/CVE-2019-8987.json index 44ac6d518bd..bb155941346 100644 --- a/2019/8xxx/CVE-2019-8987.json +++ b/2019/8xxx/CVE-2019-8987.json @@ -1,18 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-8987", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2019-03-26T16:00:00.000Z", + "ID": "CVE-2019-8987", + "STATE": "PUBLIC", + "TITLE": "TIBCO Spotfire Data Science Vulnerable to Persistent Cross-Site Scripting" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "TIBCO Data Science for AWS", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "6.4.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Data Science", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "6.4.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The application server component of TIBCO Software Inc.'s TIBCO Data Science for AWS, and TIBCO Spotfire Data Science contains a persistent cross-site scripting vulnerability that theoretically allows an authenticated user to gain access to all the capabilities of the web interface available to more privileged users.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Data Science for AWS: versions up to and including 6.4.0, and TIBCO Spotfire Data Science: versions up to and including 6.4.0." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of these multiple vulnerabilities includes the theoretical possibility that a malicious actor could gain more privileged access to the web server component." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-26-2019-tibco-spotfire-data-science-2019-8987" + }, + { + "url": "http://www.tibco.com/services/support/advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected systems which address these issues.\n\nTIBCO Data Science for AWS versions 6.4.0 and below upgrade to version 6.4.1 or higher\n\nTIBCO Spotfire Data Science versions 6.4.0 and below upgrade to version 6.4.1 or higher\n" + } + ], + "source": { + "discovery": "USER" + } +} diff --git a/2019/8xxx/CVE-2019-8988.json b/2019/8xxx/CVE-2019-8988.json index 9e7c961106b..b743c308137 100644 --- a/2019/8xxx/CVE-2019-8988.json +++ b/2019/8xxx/CVE-2019-8988.json @@ -1,18 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-8988", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2019-03-26T16:00:00.000Z", + "ID": "CVE-2019-8988", + "STATE": "PUBLIC", + "TITLE": "TIBCO Spotfire Data Science Privilege Escalation Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "TIBCO Data Science for AWS", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "6.4.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Data Science", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "6.4.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The application server component of TIBCO Software Inc.'s TIBCO Data Science for AWS, and TIBCO Spotfire Data Science contains a persistent cross-site contains a vulnerability that theoretically allows a user to escalate their privileges on the affected system, in a way that may allow for data modifications and deletions that should be denied.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Data Science for AWS: versions up to and including 6.4.0, and TIBCO Spotfire Data Science: versions up to and including 6.4.0." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of this vulnerability includes the theoretical possibility that a malicious actor could modify or delete data on the system that they should not be able to change, affecting the output that others might see.\n" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-26-2019-tibco-spotfire-data-science-2019-8988" + }, + { + "url": "http://www.tibco.com/services/support/advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected systems which address these issues.\n\nTIBCO Data Science for AWS versions 6.4.0 and below upgrade to version 6.4.1 or higher\n\nTIBCO Spotfire Data Science versions 6.4.0 and below upgrade to version 6.4.1 or higher\n" + } + ], + "source": { + "discovery": "USER" + } +} diff --git a/2019/8xxx/CVE-2019-8989.json b/2019/8xxx/CVE-2019-8989.json index e2ca75a9ef0..7a79d02eb5c 100644 --- a/2019/8xxx/CVE-2019-8989.json +++ b/2019/8xxx/CVE-2019-8989.json @@ -1,18 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-8989", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "security@tibco.com", + "DATE_PUBLIC": "2019-03-26T16:00:00.000Z", + "ID": "CVE-2019-8989", + "STATE": "PUBLIC", + "TITLE": "TIBCO Spotfire Data Science Spoofing Vulnerability" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "TIBCO Data Science for AWS", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "6.4.0" + } + ] + } + }, + { + "product_name": "TIBCO Spotfire Data Science", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "6.4.0" + } + ] + } + } + ] + }, + "vendor_name": "TIBCO Software Inc." } - ] - } -} \ No newline at end of file + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The application server component of TIBCO Software Inc.'s TIBCO Data Science for AWS, and TIBCO Spotfire Data Science contains a vulnerability that theoretically enables a user to spoof their account to look like a different user in the affected system.\n\nAffected releases are TIBCO Software Inc.'s TIBCO Data Science for AWS: versions up to and including 6.4.0, and TIBCO Spotfire Data Science: versions up to and including 6.4.0." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "The impact of this vulnerability includes the theoretical possibility that a user of the system could temporarily fool another user of the system into believing they were someone else." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-26-2019-tibco-spotfire-data-science-2019-8989" + }, + { + "url": "http://www.tibco.com/services/support/advisories" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "TIBCO has released updated versions of the affected systems which address these issues.\n\nTIBCO Data Science for AWS versions 6.4.0 and below upgrade to version 6.4.1 or higher\n\nTIBCO Spotfire Data Science versions 6.4.0 and below upgrade to version 6.4.1 or higher\n" + } + ], + "source": { + "discovery": "USER" + } +}