First published: Sat Aug 05 2017(Updated: )
Persistent Cross Site Scripting (XSS) exists in Splunk Enterprise 6.5.x before 6.5.2, 6.4.x before 6.4.6, and 6.3.x before 6.3.9 and Splunk Light before 6.5.2, with exploitation requiring administrative access, aka SPL-134104.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | =6.3.0 | |
Splunk | =6.3.1 | |
Splunk | =6.3.2 | |
Splunk | =6.3.3 | |
Splunk | =6.3.4 | |
Splunk | =6.3.5 | |
Splunk | =6.3.6 | |
Splunk | =6.3.7 | |
Splunk | =6.3.8 | |
Splunk | =6.4.0 | |
Splunk | =6.4.1 | |
Splunk | =6.4.2 | |
Splunk | =6.4.3 | |
Splunk | =6.4.4 | |
Splunk | =6.4.5 | |
Splunk | =6.5.0 | |
Splunk | =6.5.0 | |
Splunk | =6.5.1 | |
Splunk | =6.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12572 is considered to have a moderate severity level due to the requirement of administrative access for exploitation.
To fix CVE-2017-12572, upgrade Splunk Enterprise to versions 6.5.2 or later, 6.4.6 or later, or 6.3.9 or later.
CVE-2017-12572 is classified as a Persistent Cross-Site Scripting (XSS) vulnerability.
CVE-2017-12572 affects Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.6, and 6.3.x before 6.3.9, as well as Splunk Light before 6.5.2.
Yes, exploitation of CVE-2017-12572 requires administrative access to the affected versions of Splunk.