TIBCO takes its security responsibilities very seriously. This page provides information about TIBCO security and how customers or security researchers can contact TIBCO to report or ask about a security issue.
TIBCO Security Advisory: September 17, 2019 - TIBCO Enterprise Runtime for R Server - 2019-11210
TIBCO Enterprise Runtime for R Server Exposes Remote Code Execution
Original release date: September 17, 2019
Source: TIBCO Software Inc.
- TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below
- TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and 10.5.0
The following component is affected:
The component listed above contains a vulnerability that theoretically allows an unauthenticated user to bypass access controls and remotely execute code using the operating system account hosting the affected component.
The impact of this vulnerability includes the theoretical possibility that an attacker could gain full control of the operating system account hosting the affected component. In addition to the information flowing through the system, the exposed information might include secrets necessary to issue trusted requests to other TIBCO Spotfire servers.
CVSS v3 Base Score: 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
TIBCO has released updated versions of the affected systems which address this issue:
- TIBCO Enterprise Runtime for R - Server Edition versions 1.2.0 and below update to version 1.2.1 or higher
- TIBCO Spotfire Analytics Platform for AWS Marketplace versions 10.4.0 and 10.5.0 update to version 10.5.1 or higher
To temporarily remediate this vulnerability, the machine hosting the affected component can be protected via a properly configured firewall. Use a configuration that limits access to only the TIBCO Spotfire Server and the TIBCO Spotfire Web Player.