CVE-2017-3180
CVSS V2 Low 3.5
CVSS V3 Medium 5.4
Description
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
Overview
- CVE ID
- CVE-2017-3180
- Assigner
- cret@cert.org
- Vulnerability Status
- Modified
- Published Version
- 2018-07-24T15:29:00
- Last Modified Date
- 2019-10-09T23:27:19
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_web_player:*:*:*:*:*:*:*:* | 1 | OR | 2.1.2 | |
cpe:2.3:a:tibco:spotfire_analyst:7.5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_analyst:7.6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:* | 1 | OR | 7.0.2 | |
cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:* | 1 | OR | 6.5.3 | |
cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_automation_services:7.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:* | 1 | OR | 6.5.3 | |
cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_deployment_kit:7.5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_deployment_kit:7.6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:* | 1 | OR | 6.5.2 | |
cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop:7.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop:7.5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:* | 1 | OR | 7.0.1 | |
cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.5.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:* | 1 | OR | 6.5.3 | |
cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_professional:7.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:* | 1 | OR | 6.5.3 | |
cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:tibco:spotfire_web_player:7.0.1:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:S/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- SINGLE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 3.5
- Severity
- LOW
- Exploitability Score
- 6.8
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- REQUIRED
- Scope
- CHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 5.4
- Base Severity
- MEDIUM
- Exploitability Score
- 2.3
- Impact Score
- 2.7
References
Reference URL | Reference Tags |
---|---|
https://www.tibco.com//support/advisories/2017/01/tibco-security-advisory-january-10-2017-tibco-spotfire-2017-3180 | Vendor Advisory |
https://www.securityfocus.com/bid/95699 | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2017-3180 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3180 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:09:23 | Added to TrackCVE | |||
2022-12-03 10:27:16 | cert@cert.org | cret@cert.org | CVE Assigner | updated |
2022-12-03 10:27:16 | 2018-07-24T15:29Z | 2018-07-24T15:29:00 | CVE Published Date | updated |
2022-12-03 10:27:16 | 2019-10-09T23:27:19 | CVE Modified Date | updated | |
2022-12-03 10:27:16 | Modified | Vulnerability Status | updated |