CVE-2014-8301
Published Oct 16, 2014
Last updated 10 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 5.0.x before 5.0.10 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:splunk:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C505FC5B-E1FB-45F6-8AE9-B6AB85D8B8E2" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECD5CA90-779D-4A29-B763-D26F2EDA57E6" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF23AA2D-DE4A-4E23-A7F1-557668D393BA" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68651DCE-E568-4929-851F-CC2724E4E8D3" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7237A193-A364-4FF8-A24A-5B2B3B48F908" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F26955B7-0EF9-40D8-93FC-82E77A0BC58D" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A499E9E-D844-4A52-AE08-23987F5CBDAA" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E921E89-2538-46C5-86F2-9B2BB1A48788" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88F41BCC-5549-41EE-9794-9D235F62B5F6" }, { "criteria": "cpe:2.3:a:splunk:splunk:5.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A097D14-0BC7-4207-BA75-F570C7782D75" } ], "operator": "OR" } ] } ]