Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-3180


Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.4, indicating it can be exploited remotely over the network with relatively low complexity though user interaction is required requiring only low-level privileges . The vulnerability impacts limited data confidentiality, limited integrity, for affected systems. Impacting 10 products from tibco, from tibco, from tibco and 7 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2018, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2018-07-24T15:29:00.327

Last Modified

2024-11-21T03:24:58.687

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.4 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tibco silver_fabric_enabler_for_spotfire_web_player ≤ 2.1.2 Yes
Application tibco spotfire_analyst 7.5.0 Yes
Application tibco spotfire_analyst 7.6.0 Yes
Application tibco spotfire_analyst 7.7.0 Yes
Application tibco spotfire_analytics_platform_for_aws ≤ 7.0.2 Yes
Application tibco spotfire_automation_services ≤ 6.5.3 Yes
Application tibco spotfire_automation_services 7.0.0 Yes
Application tibco spotfire_automation_services 7.0.1 Yes
Application tibco spotfire_connectors 7.6.0 Yes
Application tibco spotfire_deployment_kit ≤ 6.5.3 Yes
Application tibco spotfire_deployment_kit 7.0.0 Yes
Application tibco spotfire_deployment_kit 7.0.1 Yes
Application tibco spotfire_deployment_kit 7.5.0 Yes
Application tibco spotfire_deployment_kit 7.6.0 Yes
Application tibco spotfire_deployment_kit 7.7.0 Yes
Application tibco spotfire_desktop ≤ 6.5.2 Yes
Application tibco spotfire_desktop 7.0.0 Yes
Application tibco spotfire_desktop 7.0.1 Yes
Application tibco spotfire_desktop 7.5.0 Yes
Application tibco spotfire_desktop 7.6.0 Yes
Application tibco spotfire_desktop 7.7.0 Yes
Application tibco spotfire_desktop 7.7.0 Yes
Application tibco spotfire_desktop_language_packs ≤ 7.0.1 Yes
Application tibco spotfire_desktop_language_packs 7.5.0 Yes
Application tibco spotfire_desktop_language_packs 7.6.0 Yes
Application tibco spotfire_desktop_language_packs 7.7.0 Yes
Application tibco spotfire_professional ≤ 6.5.3 Yes
Application tibco spotfire_professional 7.0.0 Yes
Application tibco spotfire_professional 7.0.1 Yes
Application tibco spotfire_web_player ≤ 6.5.3 Yes
Application tibco spotfire_web_player 7.0.0 Yes
Application tibco spotfire_web_player 7.0.1 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For tibco's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.