mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
194 lines
6.8 KiB
JSON
194 lines
6.8 KiB
JSON
{
|
|
"id": "CVE-2017-12572",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-08-05T21:29:00.177",
|
|
"lastModified": "2017-08-15T18:43:01.117",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Persistent Cross Site Scripting (XSS) exists in Splunk Enterprise 6.5.x before 6.5.2, 6.4.x before 6.4.6, and 6.3.x before 6.3.9 and Splunk Light before 6.5.2, with exploitation requiring administrative access, aka SPL-134104."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) persistente en Splunk Enterprise 6.5.x anterior a 6.5.2; 6.4.x anterior a 6.4.6; y 6.3.x anterior a 6.3.9 y Splunk Light anterior a 6.5.2, cuya explotaci\u00f3n requiere acceso de administrador, tambi\u00e9n conocido como SPL-134104."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.8,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.7,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.5
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.0:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "017E3E44-C062-463F-B9D3-75BA57992C91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.1:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "A2BB5352-F0AF-4578-979A-7E7D3259A94A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.2:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "011F96AC-580A-4798-82F9-5D7CF80505DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.3:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "8B2CE702-BB9A-426C-ADE1-6CC0CD96A2CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.4:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "51ABD86F-DD27-43D6-AC0C-BE8E7B5A6308"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.5:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "EED5369E-4539-4598-85C9-00384CBB7410"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.6:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "963C3008-04D5-4331-89E9-09FEC12FEC17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.7:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "6C85C2D3-FA71-47C4-9BA1-1008F033E24A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.3.8:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "A7686091-ABEF-4EA3-B9EC-9B09C7B05FD4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.4.0:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "D0BDC526-0F46-41E6-B723-D93A5FA288B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.4.1:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "9BCB1613-C716-4147-9E1E-0FCAD800DE1D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.4.2:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "FF59568E-ECF4-4AF9-9F70-01AB67CEACA6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.4.3:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "AA23CDDF-349C-4028-B857-FA1837BBEBEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.4.4:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "6169CE4B-429B-4DB8-B2D1-8AEAAB1BFB23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.4.5:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "40B5692A-74AE-4B06-9E6A-A8DD83AB394D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.5.0:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "EB11750A-BE9D-450C-856B-550DE8B0A55C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.5.0:*:*:*:light:*:*:*",
|
|
"matchCriteriaId": "4FACB46B-623A-460A-B8A8-59762632067B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.5.1:*:*:*:enterprise:*:*:*",
|
|
"matchCriteriaId": "61B46B1C-70A9-4959-998B-1B9927378CE2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:6.5.1:*:*:*:light:*:*:*",
|
|
"matchCriteriaId": "DAFEA182-7B21-4E96-86F2-67DC7E5DA4E3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.splunk.com/view/SP-CAAAPYC",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |