Skip to content

TIBCO Spotfire Statistics Services - Detect

ID: tibco-spotfire-services-detect

Severity: info

Author: righettod

Tags: tech,tibco,detect

TIBCO Spotfire Statistics Services was detected.

id: tibco-spotfire-services-detect
info:
name: TIBCO Spotfire Statistics Services - Detect
author: righettod
severity: info
description: |
TIBCO Spotfire Statistics Services was detected.
reference:
- https://docs.tibco.com/products/tibco-spotfire-statistics-services
classification:
cpe: cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
vendor: tibco
product: spotfire_statistics_services
shodan-query: "TIBCO Spotfire Server"
tags: tech,tibco,detect
http:
- method: GET
path:
- "{{BaseURL}}/SplusServer/"
- "{{BaseURL}}/RServer/"
- "{{BaseURL}}/TERR/"
- "{{BaseURL}}"
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'contains_any(to_lower(body), "tibco spotfire statistics services", "spotfire statistics services")'
- 'contains(header, "TIBCO Spotfire Server")'
condition: or
extractors:
- type: regex
part: body
group: 1
regex:
- 'Version\s+([0-9.\s\(\)V]+)'
# digest: 490a00463044022034db8fd24223de72159a88696318fb03d08108e9089db53a977084d098da73d9022074502b34eee7ea60f7829d977c8991a613ab20ec99a5d477ed4f44f45a13b6ef:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/technologies/tibco-spotfire-services-detect.yaml"

View on Github