TIBCO is aware of the recently announced Apache Log4J vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832). TIBCO is also aware of CVE-2021-4104 and this issue was investigated as part of our response to CVE-2021-44228. It is addressed by Note 1 below.
TIBCO Spotfire products that are affected by CVE-2021-44228 and CVE-2021-45046
TIBCO Spotfire Server
- TIBCO Spotfire Server < 7.9 is not affected (see Note 1 below)
- TIBCO Spotfire Server 7.9-10.9 is affected, mitigation is available
- TIBCO Spotfire Server 10.10 is affected, resolution (service pack) and mitigation available
- TIBCO Spotfire Server 11.0-11.3 is affected, mitigation available
- TIBCO Spotfire Server 11.4 is affected, resolution (service pack) and mitigation available
- TIBCO Spotfire Server 11.5 is affected, mitigation available
- TIBCO Spotfire Server 11.6 is affected, resolution (service pack) and mitigation available
TIBCO Spotfire Statistics Services
- TIBCO Spotfire Statistics Services <= 10.3.0 is not affected (see Note 1 below)
- TIBCO Spotfire Statistics Services 10.3.1 is affected, mitigation available
- TIBCO Spotfire Statistics Services 10.10 is affected, resolution (service pack) and mitigation available
- TIBCO Spotfire Statistics Services 11.1-11.3 is affected, mitigation available
- TIBCO Spotfire Statistics Services 11.4 is affected, resolution (service pack) and mitigation available
- TIBCO Spotfire Statistics Services 11.5 is affected, mitigation available
- TIBCO Spotfire Statistics Services 11.6 is affected, resolution (service pack) and mitigation available
TIBCO Spotfire Service for Python
- TIBCO Spotfire Service for Python 1.0 is affected, resolution (service pack) and mitigation available
- TIBCO Spotfire Service for Python 1.1-1.2 is affected, mitigation available
- TIBCO Spotfire Service for Python 1.3 is affected, resolution (service pack) and mitigation available
- TIBCO Spotfire Service for Python 1.4 is affected, mitigation available
- TIBCO Spotfire Service for Python 1.5 is affected, resolution (service pack) and mitigation available
TIBCO Enterprise Runtime for R - Server Edition
- TIBCO Enterprise Runtime for R - Server Edition 1.0-1.2 is affected, mitigation available
- TIBCO Enterprise Runtime for R - Server Edition 1.3 is affected, resolution (service pack) and mitigation available
- TIBCO Enterprise Runtime for R - Server Edition 1.4-1.6 is affected, mitigation available
- TIBCO Enterprise Runtime for R - Server Edition 1.7 is affected, resolution (service pack) and mitigation available
- TIBCO Enterprise Runtime for R - Server Edition 1.8 is affected, mitigation available
- TIBCO Enterprise Runtime for R - Server Edition 1.9 is affected, resolution (service pack) and mitigation available
TIBCO Spotfire products that are not affected
- TIBCO Spotfire Analyst
- TIBCO Spotfire Automation Services
- TIBCO Spotfire Qualification
- TIBCO Spotfire Business Author
- TIBCO Spotfire Consumer
- TIBCO Spotfire Desktop
Note 1:
If a customer has implemented the JMSAppender class for plugins they have written they should check to make sure they don’t expose this vulnerability. For more details see: https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301
Note 2:
The denial of service vulnerability CVE-2021-45105 is related to certain logging patterns with context lookups. No TIBCO Spotfire products use patterns with context lookups out of the box. However, if a customer has added such a pattern, this must be reverted. Please refer to Apache Log4j Security Vulnerabilities (https://logging.apache.org/log4j/2.x/security.html) for more information. Update: New releases and service packs containing log4j version 2.17.1, where that issue has been addressed, were released on February 2, 2022.
Note 3:
Spotfire is unaffected by vulnerability CVE-2021-44832 as it requires that the attacker can modify the log configuration file. Only trusted administrators have file system access to the TIBCO Spotfire Server, TIBCO Spotfire Statistics Services, TIBCO Spotfire Service for Python, and TIBCO Enterprise Runtime for R - Server Edition products. Update: New releases and service packs containing log4j version 2.17.1, where that issue has been addressed, were released on February 2, 2022.