First published: Tue Aug 18 2015(Updated: )
Cross-site scripting (XSS) vulnerability in the Dashboard in Splunk Enterprise 6.2.x before 6.2.4 and Splunk Light 6.2.x before 6.2.4 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | =6.2.0 | |
Splunk | =6.2.0 | |
Splunk | =6.2.1 | |
Splunk | =6.2.1 | |
Splunk | =6.2.2 | |
Splunk | =6.2.2 | |
Splunk | =6.2.3 | |
Splunk | =6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6514 is categorized as a medium-risk vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To resolve CVE-2015-6514, upgrade Splunk Enterprise to version 6.2.4 or later, or apply any provided patches.
CVE-2015-6514 affects Splunk Enterprise versions 6.2.0 through 6.2.3 and Splunk Light versions 6.2.0 through 6.2.3.
CVE-2015-6514 is a Cross-Site Scripting (XSS) vulnerability that allows remote authenticated users to inject malicious scripts.
Authenticated users of vulnerable Splunk deployments are at risk from CVE-2015-6514 as they can potentially exploit the XSS vulnerability.