René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

285 lines
13 KiB
JSON

{
"id": "CVE-2017-3180",
"sourceIdentifier": "cret@cert.org",
"published": "2018-07-24T15:29:00.327",
"lastModified": "2019-10-09T23:27:19.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1"
},
{
"lang": "es",
"value": "M\u00faltiples productos TIBCO son propensos a m\u00faltiples vulnerabilidades sin especificar de Cross-Site Scripting (XSS) debido a que fracasan a la hora de sanear entradas proporcionadas por el usuario. Un atacante podr\u00eda aprovechar estos problemas para ejecutar c\u00f3digo script arbitrario en el navegador de un usuario incauto en el contexto del sitio afectado. Esto puede permitir que el atacante robe credenciales de autenticaci\u00f3n basadas en cookies y lance otros ataques. Los productos y versiones afectadas incluyen: TIBCO Silver Fabric Enabler for Spotfire Web Player en versiones 2.1.2 y anteriores; TIBCO Spotfire Analyst 7.5.0; TIBCO Spotfire Analyst 7.6.0; TIBCO Spotfire Analyst 7.7.0; TIBCO Spotfire Analytics Platform for AWS Marketplace en versiones 7.0.2 y anteriores; TIBCO Spotfire Automation Services en versiones 6.5.3 y anteriores; TIBCO Spotfire Automation Services 7.0.0 y 7.0.1; TIBCO Spotfire Connectors 7.6.0; TIBCO Spotfire Deployment Kit en versiones 6.5.3 y anteriores; TIBCO Spotfire Deployment Kit 7.0.0 y 7.0.1; TIBCO Spotfire Deployment Kit 7.5.0; TIBCO Spotfire Deployment Kit 7.6.0; TIBCO Spotfire Deployment Kit 7.7.0; TIBCO Spotfire Desktop en versiones 6.5.2 y anteriores; TIBCO Spotfire Desktop 7.0.0 y 7.0.1; TIBCO Spotfire Desktop 7.5.0; TIBCO Spotfire Desktop 7.6.0; TIBCO Spotfire Desktop 7.7.0; TIBCO Spotfire Desktop Developer Edition 7.7.0; TIBCO Spotfire Desktop Language Packs en versiones 7.0.1 y anteriores; TIBCO Spotfire Desktop Language Packs 7.5.0; TIBCO Spotfire Desktop Language Packs 7.6.0; TIBCO Spotfire Desktop Language Packs 7.7.0; TIBCO Spotfire Professional en versiones 6.5.3 y anteriores; TIBCO Spotfire Professional 7.0.0 y 7.0.1 TIBCO Spotfire Web Player en versiones 6.5.3 y anteriores; y TIBCO Spotfire Web Player 7.0.0 y 7.0.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_web_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.2",
"matchCriteriaId": "173CF2F8-3802-4D0B-B825-518F22753246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CA67C3-1E04-4CF9-9DBF-5AAC32ED1BAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE259A9-18D9-48D2-B1DF-E9244F6C79B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD36D84-B44B-48AA-9FD0-966DFBE5CFB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.0.2",
"matchCriteriaId": "648B466E-6DDA-4A8E-BCD1-60A50B8E7680"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.5.3",
"matchCriteriaId": "2CB0628A-9C75-4196-A28C-7C1B1A116C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0424905D-696E-4D5F-957E-9D360F03E296"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_automation_services:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA7ABF1-F6DE-4908-9C09-8B523FD317A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE55C07-E141-4DEA-A9E2-B075E1F56449"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.5.3",
"matchCriteriaId": "F27A296C-6D4A-405B-86BB-F7D383C656E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D050885E-62BF-454F-A653-129269829390"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA0A8EB-9A3B-415F-9823-50C4AAD4C9AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48F2A9DC-8D5F-4516-8581-0A719FEAC867"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DADE970A-E3D6-41AC-A3E6-9F49090A0445"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "11E31011-0D3C-4339-86F0-81CD77BC3439"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.5.2",
"matchCriteriaId": "DBC24CB8-3411-438A-A99C-5DC0DD4A3128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "981372F8-3050-42BA-BF94-16478E4B04A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A19D3881-3807-4EB0-B07E-116393FAA836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "584E8D2D-E0D9-4886-81D4-B2A629884F34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12851913-2BAF-4B35-AD03-7C6B4A91C43E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF48FC-2634-4D66-8BD2-CB6D3CA04C78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:*",
"matchCriteriaId": "CA0557E9-5277-4D60-A1C6-1DC24FD7ECE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.0.1",
"matchCriteriaId": "D894B719-865C-4EB3-B0E8-6853F1BC31A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A26FF0F0-3126-4AF6-A1FA-C911FB429648"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4FF6CF3-B05C-4014-83F5-3C44D09F4FC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30D9DCB1-D307-42D0-A5CB-904D5DCCCD91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.5.3",
"matchCriteriaId": "AAF9238B-B335-4AC3-A866-A25D708CBE93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D883BEDD-2A54-4D01-8322-E7804D1D057A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_professional:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE1B65E-1DAF-43A4-B5AC-956ABA66A078"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.5.3",
"matchCriteriaId": "E9D754F3-9358-4163-9999-23AB931AA790"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C96AC0E-4C68-4CDD-A73F-3B19D2EEFE8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tibco:spotfire_web_player:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1959D810-72DC-4B6A-8BD9-6B80C49A5315"
}
]
}
]
}
],
"references": [
{
"url": "https://www.securityfocus.com/bid/95699",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
}
]
}