First published: Tue Aug 18 2015(Updated: )
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.2.x before 6.2.4, 6.1.x before 6.1.8, 6.0.x before 6.0.9, and 5.0.x before 5.0.13 and Splunk Light 6.2.x before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via a header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | =5.0.0 | |
Splunk | =5.0.1 | |
Splunk | =5.0.2 | |
Splunk | =5.0.3 | |
Splunk | =5.0.4 | |
Splunk | =5.0.5 | |
Splunk | =5.0.6 | |
Splunk | =5.0.7 | |
Splunk | =5.0.8 | |
Splunk | =5.0.9 | |
Splunk | =5.0.10 | |
Splunk | =5.0.11 | |
Splunk | =5.0.12 | |
Splunk | =6.0.0 | |
Splunk | =6.0.1 | |
Splunk | =6.0.2 | |
Splunk | =6.0.3 | |
Splunk | =6.0.4 | |
Splunk | =6.0.5 | |
Splunk | =6.0.6 | |
Splunk | =6.0.7 | |
Splunk | =6.0.8 | |
Splunk | =6.1.0 | |
Splunk | =6.1.1 | |
Splunk | =6.1.2 | |
Splunk | =6.1.3 | |
Splunk | =6.1.4 | |
Splunk | =6.1.5 | |
Splunk | =6.1.6 | |
Splunk | =6.1.7 | |
Splunk | =6.2.0 | |
Splunk | =6.2.0 | |
Splunk | =6.2.1 | |
Splunk | =6.2.1 | |
Splunk | =6.2.2 | |
Splunk | =6.2.2 | |
Splunk | =6.2.3 | |
Splunk | =6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6515 is considered a medium severity vulnerability due to the potential for remote cross-site scripting attacks.
To fix CVE-2015-6515, update Splunk to version 6.2.4 or later, or to 6.1.8, 6.0.9, or 5.0.13 for the respective older versions.
CVE-2015-6515 allows attackers to inject arbitrary web scripts or HTML through manipulated headers.
CVE-2015-6515 affects Splunk Enterprise versions prior to 6.2.4, 6.1.8, 6.0.9, and 5.0.13, as well as Splunk Light prior to 6.2.4.
CVE-2015-6515 is easily exploitable as it allows remote attackers to execute XSS attacks without requiring authentication.