CVE-2017-5607
Published Apr 10, 2017
Last updated 6 years ago
Overview
- Description
- Splunk Enterprise 5.0.x before 5.0.18, 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.13.1, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3 and Splunk Light before 6.5.2 assigns the $C JS property to the global Window namespace, which might allow remote attackers to obtain sensitive logged-in username and version-related information via a crafted webpage.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 1.4
- Exploitability score
- 2.1
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
- Severity
- LOW
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:light:*:*:*", "vulnerable": true, "matchCriteriaId": "19EBA2BD-619F-483D-A700-808310231B4A", "versionEndIncluding": "6.5.1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "D5754FB3-CEBA-48F7-BBE6-165A2D10A6A4", "versionEndExcluding": "5.0.18", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "714A3778-5FDD-4082-BB59-6C91308A3710", "versionEndExcluding": "6.0.14", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "834584D3-1FA7-40A6-B281-334E1C49E2C7", "versionEndExcluding": "6.1.13", "versionStartIncluding": "6.1.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "0C91EEF3-D813-48C6-B63C-5E0C98B33024", "versionEndExcluding": "6.2.13.1", "versionStartIncluding": "6.2.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "202FABCF-8755-45B0-A028-41C70F133F99", "versionEndExcluding": "6.3.10", "versionStartIncluding": "6.3.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "F8E688A6-4818-4D3C-8DE1-6C73BC48CE37", "versionEndExcluding": "6.4.6", "versionStartIncluding": "6.4.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "9DBD04AF-CB9D-4E1A-9A9B-83178805D585", "versionEndExcluding": "6.5.3", "versionStartIncluding": "6.5.0" } ], "operator": "OR" } ] } ]