Jump to content
  • TIBCO Security Advisory: August 31, 2011 - TIBCO Spotfire - CVE-2011-3132, CVE-2011-3133, CVE-2011-3134


    TIBCO Spotfire vulnerabilities

    Original release date: Aug 31, 2011
    Last revised: --
    CVE-2011-3132CVE-2011-3133CVE-2011-3134
    Source: TIBCO Software Inc.

    Description

    The TIBCO Spotfire Server contains several critical vulnerabilities in the processing of inbound HTTP requests:

    CVE-2011-3132 - A cross-site scripting vulnerability exists which may allow an attacker to view or modify information.

    CVE-2011-3133 - A session fixation vulnerability exists which may allow an attacker to hijack a web session from another user.

    CVE-2011-3134 - Carefully crafted URLs may result in information disclosure or modification.

    TIBCO has released updated versions of the affected software products which address these issues. TIBCO strongly recommends sites running the affected components install the applicable update or take corrective action as described below.

    Systems Affected

    • TIBCO Spotfire Analytics Server versions below 10.1.1
    • TIBCO Spotfire Server versions 3.0.0, 3.0.1, 3.1.0, 3.1.1, 3.2.0, 3.3.0

    The following components are affected:

    • TIBCO Spotfire Web Application

    Impact

    The impact of these vulnerabilities may include information modification, information disclosure, and denial of service.

    Solution

    For each affected system, update to the corresponding software versions:

    • TIBCO Spotfire Analytics Server version 10.1.1 or higher
    • TIBCO Spotfire Server 3.0.X version 3.0.2 or higher
    • TIBCO Spotfire Server 3.1.X version 3.1.2 or higher
    • TIBCO Spotfire Server 3.2.X version 3.2.1 or higher
    • TIBCO Spotfire Server 3.3.X version 3.3.1 or higher

    This is strongly recommended.

    If an upgrade is not possible, the following actions can mitigate the vulnerability:

    • Utilize a firewall to restrict access to the TIBCO Spotfire server.

     

    The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). Spotfire makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SPOTFIRE SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with Spotfire, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with Spotfire, this information is provided under the Spotfire.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.


    User Feedback

    Recommended Comments

    There are no comments to display.



    Guest
    This is now closed for further comments

×
×
  • Create New...