Lucene search

K
cvelistTibcoCVELIST:CVE-2020-9416
HistorySep 15, 2020 - 12:00 a.m.

CVE-2020-9416 TIBCO Spotfire Stored Cross Site Scripting Vulnerability

2020-09-1500:00:00
tibco
www.cve.org

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.7%

The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1.

CNA Affected

[
  {
    "product": "TIBCO Spotfire Analyst",
    "vendor": "TIBCO Software Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "10.7.0"
      },
      {
        "status": "affected",
        "version": "10.8.0"
      },
      {
        "status": "affected",
        "version": "10.9.0"
      },
      {
        "status": "affected",
        "version": "10.10.0"
      }
    ]
  },
  {
    "product": "TIBCO Spotfire Analytics Platform for AWS Marketplace",
    "vendor": "TIBCO Software Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "10.7.0"
      },
      {
        "status": "affected",
        "version": "10.8.0"
      },
      {
        "status": "affected",
        "version": "10.8.1"
      },
      {
        "status": "affected",
        "version": "10.9.0"
      },
      {
        "status": "affected",
        "version": "10.10.0"
      },
      {
        "status": "affected",
        "version": "10.10.1"
      }
    ]
  },
  {
    "product": "TIBCO Spotfire Desktop",
    "vendor": "TIBCO Software Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "10.7.0"
      },
      {
        "status": "affected",
        "version": "10.8.0"
      },
      {
        "status": "affected",
        "version": "10.9.0"
      },
      {
        "status": "affected",
        "version": "10.10.0"
      }
    ]
  },
  {
    "product": "TIBCO Spotfire Server",
    "vendor": "TIBCO Software Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "10.7.0"
      },
      {
        "status": "affected",
        "version": "10.8.0"
      },
      {
        "status": "affected",
        "version": "10.8.1"
      },
      {
        "status": "affected",
        "version": "10.9.0"
      },
      {
        "status": "affected",
        "version": "10.10.0"
      },
      {
        "status": "affected",
        "version": "10.10.1"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.7%

Related for CVELIST:CVE-2020-9416