cvelist/2017/17xxx/CVE-2017-17067.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2017-11-29 21:03:08 -05:00
{
2019-03-17 21:48:44 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-17067",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-11-29 21:03:08 -05:00
{
2019-03-17 21:48:44 +00:00
"lang": "eng",
"value": "Splunk Web in Splunk Enterprise 7.0.x before 7.0.0.1, 6.6.x before 6.6.3.2, 6.5.x before 6.5.6, 6.4.x before 6.4.9, and 6.3.x before 6.3.12, when the SAML authType is enabled, mishandles SAML, which allows remote attackers to bypass intended access restrictions or conduct impersonation attacks."
2017-11-29 21:03:08 -05:00
}
2019-03-17 21:48:44 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "102005",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102005"
},
{
"name": "https://www.splunk.com/view/SP-CAAAP3K",
"refsource": "CONFIRM",
"url": "https://www.splunk.com/view/SP-CAAAP3K"
}
]
}
}