René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

186 lines
6.5 KiB
JSON

{
"id": "CVE-2014-8302",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-10-16T19:55:16.987",
"lastModified": "2014-10-23T14:14:40.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.1.x before 6.1.4, 6.0.x before 6.0.6, and 5.0.x before 5.0.10 allows remote attackers to inject arbitrary web script or HTML via vectors related to dashboard."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en Splunk Web en Splunk Enterpirse 6.1.x anterior a 6.1.x anterior a 6.1.4, 6.0.x anterior a 6.0.6, y 5.0.x anterior a 5.0.10 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores relacionados con dashboard."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C505FC5B-E1FB-45F6-8AE9-B6AB85D8B8E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD5CA90-779D-4A29-B763-D26F2EDA57E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF23AA2D-DE4A-4E23-A7F1-557668D393BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68651DCE-E568-4929-851F-CC2724E4E8D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7237A193-A364-4FF8-A24A-5B2B3B48F908"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F26955B7-0EF9-40D8-93FC-82E77A0BC58D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0A499E9E-D844-4A52-AE08-23987F5CBDAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E921E89-2538-46C5-86F2-9B2BB1A48788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "88F41BCC-5549-41EE-9794-9D235F62B5F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1A097D14-0BC7-4207-BA75-F570C7782D75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "08C26981-B12C-4C2B-A5CA-41DE1BD4B124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E673B35A-975D-4680-A62C-64581697E2E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "107859A5-076A-47BD-83A9-7249A0852823"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F9FBC9-A0A4-463B-9632-87E66703D807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24373712-F6B5-4428-9D4B-C15CEE4B51C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A26FA5CD-7C9E-41ED-AAF2-D18AC89E4CBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3A40B9-4557-46E2-803C-7B71C6906342"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.1:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2620A075-A13C-42EE-B320-A9356FAD98DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.1.1:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "BE618334-8239-42DB-9F79-DE9241AEBF5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.1.2:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "D3764A91-2A1C-4076-8F2C-ECED2FFD15DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:6.1.3:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "C9BF3278-84C0-46CE-9CB4-952D0361A117"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securitytracker.com/id/1030994",
"source": "cve@mitre.org"
},
{
"url": "http://www.splunk.com/view/SP-CAAANHS",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}