René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

172 lines
6.4 KiB
JSON

{
"id": "CVE-2021-43051",
"sourceIdentifier": "security@tibco.com",
"published": "2021-12-14T20:15:07.553",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious custom API clients with network access to execute internal API operations outside of the scope of those granted to it. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Server: versions 10.10.6 and below, TIBCO Spotfire Server: versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1, and TIBCO Spotfire Server: versions 11.5.0 and 11.6.0."
},
{
"lang": "es",
"value": "El componente Spotfire Server de TIBCO Software Inc. contiene una vulnerabilidad dif\u00edcil de explotar que permite a clientes maliciosos de la API personalizada con acceso a la red ejecutar operaciones internas de la API fuera del alcance de las concedidas. Un ataque con \u00e9xito usando esta vulnerabilidad requiere la interacci\u00f3n humana de una persona distinta al atacante. Las versiones afectadas son TIBCO Spotfire Server de TIBCO Software Inc.: versiones 10.10.6 y anteriores, TIBCO Spotfire Server: versiones 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0 y 11.4.1, y TIBCO Spotfire Server: versiones 11.5.0 y 11.6.0"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "security@tibco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.10.6",
"matchCriteriaId": "65F48E15-4E1E-4CD0-A737-1D6818E81071"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58D5C32A-F10F-4237-99BB-163B4B7D6D1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B68BAB9A-2479-4C36-B12A-D9F5A6C98D0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA8E5F64-CCF2-41D5-B93A-1A0BB5248F02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F9262AA9-DFE0-4D68-AF0A-257C8B4AB307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D52525B5-0D8D-4C1A-81A5-0D22AF28D8C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DB76DC2-D561-42F4-8272-3B342F75EBE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50269188-015E-406A-90B8-5F113773A3D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBDD97C0-212A-4E53-9246-65ED746C6554"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tibco.com/services/support/advisories",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tibco.com/support/advisories/2021/12/tibco-security-advisory-december-14-2021-tibco-spotfire-server-2021-43051",
"source": "security@tibco.com",
"tags": [
"Vendor Advisory"
]
}
]
}