Security Advisory Regarding TIBCO Enterprise Runtime for R Server

Security Advisory Regarding TIBCO Enterprise Runtime for R Server

book

Article ID: KB0108060

calendar_today

Updated On:

Products Versions
Spotfire Enterprise Runtime for R - Server Edition 1.2.0 and below

Description

TIBCO Enterprise Runtime for R Server Exposes Remote Code Execution

  Original release date: September 17, 2019
  Last revised: ---
  Source: TIBCO Software Inc.

Description

  The component listed above contains a vulnerability that theoretically allows
  an unauthenticated user to bypass access controls and remotely execute code
  using the operating system account hosting the affected component.


Impact

  The impact of this vulnerability includes the theoretical possibility that an
  attacker could gain full control of the operating system account hosting the
  affected component. In addition to the information flowing through the system,
  the exposed information might include secrets necessary to issue trusted
  requests to other TIBCO Spotfire servers.

  CVSS v3 Base Score: 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Issue/Introduction

Security Advisory Regarding TIBCO Enterprise Runtime for R Server

Environment

Systems Affected TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and 10.5.0 The following component is affected: * server

Resolution

Solution

  TIBCO has released updated versions of the affected systems which address this
  issue:

  TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below
    update to version 1.2.1 or higher

  TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and
    10.5.0 update to version 10.5.1 or higher

  To temporarily remediate this vulnerability, the machine hosting the affected
  component can be protected via a properly configured firewall. Use a
  configuration that restricts access to only the TIBCO Spotfire Server.

Additional Information

References

  http://www.tibco.com/services/support/advisories
  CVE-2019-11210