{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-26220","assignerOrgId":"4f830c72-39e4-45f6-a99f-78cc01ae04db","state":"PUBLISHED","assignerShortName":"tibco","dateReserved":"2023-02-20T22:18:23.427Z","datePublished":"2023-10-10T22:06:36.002Z","dateUpdated":"2024-09-18T16:14:49.914Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Spotfire Analyst","vendor":"TIBCO Software Inc.","versions":[{"lessThanOrEqual":"11.4.7","status":"affected","version":"0","versionType":"semver"},{"status":"affected","version":"11.5.0"},{"status":"affected","version":"11.6.0"},{"status":"affected","version":"11.7.0"},{"status":"affected","version":"11.8.0"},{"status":"affected","version":"12.0.0"},{"status":"affected","version":"12.0.1"},{"status":"affected","version":"12.0.2"},{"status":"affected","version":"12.0.3"},{"status":"affected","version":"12.0.4"},{"status":"affected","version":"12.1.0"},{"status":"affected","version":"12.1.1"}]},{"defaultStatus":"unknown","product":"Spotfire Server","vendor":"TIBCO Software Inc.","versions":[{"lessThanOrEqual":"11.4.11","status":"affected","version":"0","versionType":"semver"},{"status":"affected","version":"11.5.0"},{"status":"affected","version":"11.6.0"},{"status":"affected","version":"11.6.1"},{"status":"affected","version":"11.6.2"},{"status":"affected","version":"11.6.3"},{"status":"affected","version":"11.7.0"},{"status":"affected","version":"11.8.0"},{"status":"affected","version":"11.8.1"},{"status":"affected","version":"12.0.0"},{"status":"affected","version":"12.0.1"},{"status":"affected","version":"12.0.2"},{"status":"affected","version":"12.0.3"},{"status":"affected","version":"12.0.4"},{"status":"affected","version":"12.0.5"},{"status":"affected","version":"12.1.0"},{"status":"affected","version":"12.1.1"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.</p>"}],"value":"The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4f830c72-39e4-45f6-a99f-78cc01ae04db","shortName":"tibco","dateUpdated":"2023-10-10T22:06:36.002Z"},"references":[{"url":"https://www.tibco.com/services/support/advisories"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>TIBCO has released updated versions of the affected components which address these issues.</p><p>Spotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or later</p><p>Spotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4: update to version 12.0.5 or later</p><p>Spotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or later</p><p>Spotfire Server versions 11.4.11 and below: update to version 11.4.12 or later</p><p>Spotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5: update to version 12.0.6 or later</p><p>Spotfire Server versions 12.1.0 and 12.1.1: update to version 12.5.0 or later</p>"}],"value":"TIBCO has released updated versions of the affected components which address these issues.\n\nSpotfire Analyst versions 11.4.7 and below: update to version 11.4.8 or later\n\nSpotfire Analyst versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4: update to version 12.0.5 or later\n\nSpotfire Analyst versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\n\nSpotfire Server versions 11.4.11 and below: update to version 11.4.12 or later\n\nSpotfire Server versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5: update to version 12.0.6 or later\n\nSpotfire Server versions 12.1.0 and 12.1.1: update to version 12.5.0 or later\n\n"}],"source":{"discovery":"EXTERNAL"},"title":"TIBCO Spotfire Stored Cross-site Scripting (XSS) vulnerability","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:46:24.112Z"},"title":"CVE Program Container","references":[{"url":"https://www.tibco.com/services/support/advisories","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T16:14:40.488828Z","id":"CVE-2023-26220","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T16:14:49.914Z"}}]}}