CVE-2017-3180

CVSS V2 Low 3.5 CVSS V3 Medium 5.4
Description
Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1
Overview
  • CVE ID
  • CVE-2017-3180
  • Assigner
  • cret@cert.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2018-07-24T15:29:00
  • Last Modified Date
  • 2019-10-09T23:27:19
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:tibco:silver_fabric_enabler_for_spotfire_web_player:*:*:*:*:*:*:*:* 1 OR 2.1.2
cpe:2.3:a:tibco:spotfire_analyst:7.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_analyst:7.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_analyst:7.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_analytics_platform_for_aws:*:*:*:*:*:*:*:* 1 OR 7.0.2
cpe:2.3:a:tibco:spotfire_automation_services:*:*:*:*:*:*:*:* 1 OR 6.5.3
cpe:2.3:a:tibco:spotfire_automation_services:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_automation_services:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_connectors:7.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_deployment_kit:*:*:*:*:*:*:*:* 1 OR 6.5.3
cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_deployment_kit:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_deployment_kit:7.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_deployment_kit:7.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_deployment_kit:7.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop:*:*:*:*:*:*:*:* 1 OR 6.5.2
cpe:2.3:a:tibco:spotfire_desktop:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop:7.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop:7.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop:7.7.0:*:*:*:developer:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop_language_packs:*:*:*:*:*:*:*:* 1 OR 7.0.1
cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_desktop_language_packs:7.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_professional:*:*:*:*:*:*:*:* 1 OR 6.5.3
cpe:2.3:a:tibco:spotfire_professional:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_professional:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_web_player:*:*:*:*:*:*:*:* 1 OR 6.5.3
cpe:2.3:a:tibco:spotfire_web_player:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:tibco:spotfire_web_player:7.0.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:S/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 3.5
  • Severity
  • LOW
  • Exploitability Score
  • 6.8
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 5.4
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.3
  • Impact Score
  • 2.7
History
Created Old Value New Value Data Type Notes
2022-05-10 17:09:23 Added to TrackCVE
2022-12-03 10:27:16 cert@cert.org cret@cert.org CVE Assigner updated
2022-12-03 10:27:16 2018-07-24T15:29Z 2018-07-24T15:29:00 CVE Published Date updated
2022-12-03 10:27:16 2019-10-09T23:27:19 CVE Modified Date updated
2022-12-03 10:27:16 Modified Vulnerability Status updated