Show plain JSON{"containers": {"cna": {"affected": [{"product": "TIBCO Spotfire Server", "vendor": "TIBCO Software Inc.", "versions": [{"lessThanOrEqual": "10.10.6", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "TIBCO Spotfire Server", "vendor": "TIBCO Software Inc.", "versions": [{"status": "affected", "version": "11.0.0"}, {"status": "affected", "version": "11.1.0"}, {"status": "affected", "version": "11.2.0"}, {"status": "affected", "version": "11.3.0"}, {"status": "affected", "version": "11.4.0"}, {"status": "affected", "version": "11.4.1"}]}, {"product": "TIBCO Spotfire Server", "vendor": "TIBCO Software Inc.", "versions": [{"status": "affected", "version": "11.5.0"}, {"status": "affected", "version": "11.6.0"}]}], "datePublic": "2021-12-14T00:00:00", "descriptions": [{"lang": "en", "value": "The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious custom API clients with network access to execute internal API operations outside of the scope of those granted to it. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Server: versions 10.10.6 and below, TIBCO Spotfire Server: versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1, and TIBCO Spotfire Server: versions 11.5.0 and 11.6.0."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "In the worst case, if the user is a privileged administrator, successful execution of these vulnerabilities can result in an attacker gaining full administrative access to the affected system.", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2021-12-14T20:06:22", "orgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db", "shortName": "tibco"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://www.tibco.com/services/support/advisories"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://www.tibco.com/support/advisories/2021/12/tibco-security-advisory-december-14-2021-tibco-spotfire-server-2021-43051"}], "solutions": [{"lang": "en", "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Server versions 10.10.6 and below update to version 10.10.7 or later\nTIBCO Spotfire Server versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1 update to version 11.4.2 or later\nTIBCO Spotfire Server versions 11.5.0 and 11.6.0 update to version 11.6.1 or later"}], "source": {"discovery": "INTERNAL"}, "title": "TIBCO Spotfire Server API Authorization Vulnerability", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@tibco.com", "DATE_PUBLIC": "2021-12-14T17:00:00Z", "ID": "CVE-2021-43051", "STATE": "PUBLIC", "TITLE": "TIBCO Spotfire Server API Authorization Vulnerability"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "TIBCO Spotfire Server", "version": {"version_data": [{"version_affected": "<=", "version_value": "10.10.6"}]}}, {"product_name": "TIBCO Spotfire Server", "version": {"version_data": [{"version_affected": "=", "version_value": "11.0.0"}, {"version_affected": "=", "version_value": "11.1.0"}, {"version_affected": "=", "version_value": "11.2.0"}, {"version_affected": "=", "version_value": "11.3.0"}, {"version_affected": "=", "version_value": "11.4.0"}, {"version_affected": "=", "version_value": "11.4.1"}]}}, {"product_name": "TIBCO Spotfire Server", "version": {"version_data": [{"version_affected": "=", "version_value": "11.5.0"}, {"version_affected": "=", "version_value": "11.6.0"}]}}]}, "vendor_name": "TIBCO Software Inc."}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious custom API clients with network access to execute internal API operations outside of the scope of those granted to it. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Server: versions 10.10.6 and below, TIBCO Spotfire Server: versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1, and TIBCO Spotfire Server: versions 11.5.0 and 11.6.0."}]}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "In the worst case, if the user is a privileged administrator, successful execution of these vulnerabilities can result in an attacker gaining full administrative access to the affected system."}]}]}, "references": {"reference_data": [{"name": "https://www.tibco.com/services/support/advisories", "refsource": "CONFIRM", "url": "https://www.tibco.com/services/support/advisories"}, {"name": "https://www.tibco.com/support/advisories/2021/12/tibco-security-advisory-december-14-2021-tibco-spotfire-server-2021-43051", "refsource": "CONFIRM", "url": "https://www.tibco.com/support/advisories/2021/12/tibco-security-advisory-december-14-2021-tibco-spotfire-server-2021-43051"}]}, "solution": [{"lang": "en", "value": "TIBCO has released updated versions of the affected components which address these issues.\n\nTIBCO Spotfire Server versions 10.10.6 and below update to version 10.10.7 or later\nTIBCO Spotfire Server versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1 update to version 11.4.2 or later\nTIBCO Spotfire Server versions 11.5.0 and 11.6.0 update to version 11.6.1 or later"}], "source": {"discovery": "INTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T03:47:13.411Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.tibco.com/services/support/advisories"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.tibco.com/support/advisories/2021/12/tibco-security-advisory-december-14-2021-tibco-spotfire-server-2021-43051"}]}]}, "cveMetadata": {"assignerOrgId": "4f830c72-39e4-45f6-a99f-78cc01ae04db", "assignerShortName": "tibco", "cveId": "CVE-2021-43051", "datePublished": "2021-12-14T19:20:10.307673Z", "dateReserved": "2021-10-27T00:00:00", "dateUpdated": "2024-09-16T21:09:03.934Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}