First published: Tue Oct 23 2018(Updated: )
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk Enterprise 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | <6.6.0 | |
Splunk Splunk | >=6.0.0<6.0.14 | |
Splunk Splunk | >=6.1.0<6.1.13 | |
Splunk Splunk | >=6.2.0<6.2.14 | |
Splunk Splunk | >=6.3.0<6.3.10 | |
Splunk Splunk | >=6.4.0<6.4.7 | |
Splunk Splunk | >=6.5.0<6.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7427 has been classified as a high severity vulnerability due to its potential for exploitation via cross-site scripting.
To fix CVE-2018-7427, you should update to Splunk Enterprise version 6.0.14 or newer, or to Splunk Light version 6.6.0 or newer.
CVE-2018-7427 affects Splunk Web in specific versions of Splunk Enterprise and Splunk Light prior to their respective patches.
CVE-2018-7427 is a cross-site scripting (XSS) vulnerability allowing attackers to inject arbitrary web scripts or HTML.
Splunk versions prior to 6.0.14, 6.1.13, 6.2.14, 6.3.10, 6.4.7, and 6.5.3, along with all versions of Splunk Light before 6.6.0 are vulnerable.