{ "id": "CVE-2017-12572", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-05T21:29:00.177", "lastModified": "2017-08-15T18:43:01.117", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Persistent Cross Site Scripting (XSS) exists in Splunk Enterprise 6.5.x before 6.5.2, 6.4.x before 6.4.6, and 6.3.x before 6.3.9 and Splunk Light before 6.5.2, with exploitation requiring administrative access, aka SPL-134104." }, { "lang": "es", "value": "Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) persistente en Splunk Enterprise 6.5.x anterior a 6.5.2; 6.4.x anterior a 6.4.6; y 6.3.x anterior a 6.3.9 y Splunk Light anterior a 6.5.2, cuya explotaci\u00f3n requiere acceso de administrador, tambi\u00e9n conocido como SPL-134104." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.7, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.5 }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "017E3E44-C062-463F-B9D3-75BA57992C91" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A2BB5352-F0AF-4578-979A-7E7D3259A94A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "011F96AC-580A-4798-82F9-5D7CF80505DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.3:*:*:*:enterprise:*:*:*", "matchCriteriaId": "8B2CE702-BB9A-426C-ADE1-6CC0CD96A2CF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.4:*:*:*:enterprise:*:*:*", "matchCriteriaId": "51ABD86F-DD27-43D6-AC0C-BE8E7B5A6308" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.5:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EED5369E-4539-4598-85C9-00384CBB7410" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.6:*:*:*:enterprise:*:*:*", "matchCriteriaId": "963C3008-04D5-4331-89E9-09FEC12FEC17" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.7:*:*:*:enterprise:*:*:*", "matchCriteriaId": "6C85C2D3-FA71-47C4-9BA1-1008F033E24A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.3.8:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A7686091-ABEF-4EA3-B9EC-9B09C7B05FD4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.4.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D0BDC526-0F46-41E6-B723-D93A5FA288B1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.4.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "9BCB1613-C716-4147-9E1E-0FCAD800DE1D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.4.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "FF59568E-ECF4-4AF9-9F70-01AB67CEACA6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.4.3:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AA23CDDF-349C-4028-B857-FA1837BBEBEB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.4.4:*:*:*:enterprise:*:*:*", "matchCriteriaId": "6169CE4B-429B-4DB8-B2D1-8AEAAB1BFB23" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.4.5:*:*:*:enterprise:*:*:*", "matchCriteriaId": "40B5692A-74AE-4B06-9E6A-A8DD83AB394D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.5.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EB11750A-BE9D-450C-856B-550DE8B0A55C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.5.0:*:*:*:light:*:*:*", "matchCriteriaId": "4FACB46B-623A-460A-B8A8-59762632067B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.5.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "61B46B1C-70A9-4959-998B-1B9927378CE2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk:6.5.1:*:*:*:light:*:*:*", "matchCriteriaId": "DAFEA182-7B21-4E96-86F2-67DC7E5DA4E3" } ] } ] } ], "references": [ { "url": "https://www.splunk.com/view/SP-CAAAPYC", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] } ] }