TIBCO Spotfire Stored Cross-site Scripting (XSS) vulnerability
Original release date: October 10, 2023
Last revised: —
CVE-2023-26220
Source: TIBCO Software Inc.
Products Affected
- TIBCO Spotfire Analyst versions 11.4.7 and below
- TIBCO Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3 and 12.0.4
- TIBCO Spotfire Analyst versions 12.1.0 and 12.1.1
- TIBCO Spotfire Server versions 11.4.11 and below
- TIBCO Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4 and 12.0.5
- TIBCO Spotfire Server versions 12.1.0 and 12.1.1
The following component is affected:
- Spotfire Library
Description
The component listed above contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker.
Impact
Successful execution of this vulnerability will result in an attacker being able to invoke [web] services with the privileges of the affected user.
CVSS v3.1 Base Score: 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
Solution
- TIBCO has released updated versions of the affected systems which address this issue:
- TIBCO Spotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or higher
- TIBCO Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3 and 12.0.4: update to version 12.0.5 or higher
- TIBCO Spotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or higher
- TIBCO Spotfire Server versions 11.4.11 and below: update to 11.4.12 or higher
- TIBCO Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4 and 12.0.5: update to 12.0.6 or higher
- TIBCO Spotfire Server versions 12.1.0 and 12.1.1: update to 12.5.0 or higher
The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). Spotfire makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SPOTFIRE SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with Spotfire , and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with Spotfire , this information is provided under the Spotfire .com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.
Recommended Comments
There are no comments to display.