Introducing the all-new TIBCO Community site!

For current users, please click "Sign In" to reset your password and access the enhanced features. If you're a first-time visitor, we extend a warm welcome—click "Sign Up" to become a part of the TIBCO Community!

If you're seeking alternative community sites, explore ibi, Jaspersoft, and Spotfire.

Jump to content
  • TIBCO Security Advisory: September 17, 2019 -TIBCO Enterprise Runtime for R Server -2019-11210


    admin

    TIBCO Enterprise Runtime for R Server Exposes Remote Code Execution

    Original release date: September 17, 2019
    Last revised:
    CVE-2019-11210
    Source: TIBCOSoftware Inc.

    TIBCO Enterprise Runtime for R Server Exposes Remote Code Execution

    Original release date: September 17, 2019
    Last revised: ---
    Source: TIBCO Software Inc.


    Systems Affected

    TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below

    TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and
    10.5.0

    The following component is affected:

    * server


    Description

    The component listed above contains a vulnerability that theoretically allows
    an unauthenticated user to bypass access controls and remotely execute code
    using the operating system account hosting the affected component.


    Impact

    The impact of this vulnerability includes the theoretical possibility that an
    attacker could gain full control of the operating system account hosting the
    affected component. In addition to the information flowing through the system,
    the exposed information might include secrets necessary to issue trusted
    requests to other TIBCO Spotfire servers.

    CVSS v3 Base Score: 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)


    Solution

    TIBCO has released updated versions of the affected systems which address this
    issue:

    TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below
    update to version 1.2.1 or higher

    TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and
    10.5.0 update to version 10.5.1 or higher

    To temporarily remediate this vulnerability, the machine hosting the affected
    component can be protected via a properly configured firewall. Use a
    configuration that limits access to only the TIBCO Spotfire Server and the
    TIBCO Spotfire Web Player.


    References

    http://www.tibco.com/services/support/advisories
    CVE-2019-11210

    The information on this page is being provided toyou on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the informationcontained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AREHEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THEINFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement.If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...