First published: Fri May 12 2017(Updated: )
Cross-site scripting vulnerability in Splunk Enterprise 6.3.x prior to 6.3.5 and Splunk Light 6.3.x prior to 6.3.5 allows attacker with administrator rights to inject arbitrary web script or HTML via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | =6.3.0 | |
Splunk | =6.3.0 | |
Splunk | =6.3.1 | |
Splunk | =6.3.1 | |
Splunk | =6.3.2 | |
Splunk | =6.3.2 | |
Splunk | =6.3.3 | |
Splunk | =6.3.3 | |
Splunk | =6.3.4 | |
Splunk | =6.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4856 is considered a high severity vulnerability due to the potential for an attacker with administrator rights to execute arbitrary web scripts or HTML.
To fix CVE-2016-4856, upgrade Splunk Enterprise and Splunk Light to version 6.3.5 or later.
CVE-2016-4856 affects Splunk Enterprise versions 6.3.0 to 6.3.4 and Splunk Light versions 6.3.0 to 6.3.4.
CVE-2016-4856 can be exploited by an attacker who has administrator rights.
CVE-2016-4856 is a cross-site scripting (XSS) vulnerability.