First published: Wed Oct 28 2015(Updated: )
Spotfire Parsing Library and Spotfire Security Filter in TIBCO Spotfire Server 5.5.x before 5.5.4, 6.0.x before 6.0.5, 6.5.x before 6.5.4, and 7.0.x before 7.0.1 and Spotfire Analytics Platform before 7.0.2 for AWS Marketplace allow remote attackers to obtain sensitive log information by visiting an unspecified URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Spotfire | =5.5.0 | |
TIBCO Spotfire | =5.5.1 | |
TIBCO Spotfire | =5.5.2 | |
TIBCO Spotfire | =5.5.3 | |
TIBCO Spotfire | =6.0.0 | |
TIBCO Spotfire | =6.0.1 | |
TIBCO Spotfire | =6.0.2 | |
TIBCO Spotfire | =6.0.3 | |
TIBCO Spotfire | =6.0.4 | |
TIBCO Spotfire | =6.5.0 | |
TIBCO Spotfire | =6.5.1 | |
TIBCO Spotfire | =6.5.2 | |
TIBCO Spotfire | =6.5.3 | |
TIBCO Spotfire | =7.0.0 | |
TIBCO Spotfire Analytics Platform | <=7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5713 is considered a medium severity vulnerability as it allows remote attackers to access sensitive log information.
To fix CVE-2015-5713, upgrade TIBCO Spotfire Server to version 5.5.4, 6.0.5, 6.5.4, 7.0.1, or later for affected platforms.
CVE-2015-5713 affects TIBCO Spotfire Server versions 5.5.0 to 5.5.3, 6.0.0 to 6.0.4, 6.5.0 to 6.5.3, 7.0.0, and Spotfire Analytics Platform for AWS version up to 7.0.1.
CVE-2015-5713 could expose sensitive log information which may contain crucial operational details.
There are no documented workarounds for CVE-2015-5713, and upgrading to the patched versions is recommended.