Splunk Enterprise 5.0.x before 5.0.18, 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.13.1, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3 and Splunk Light before 6.5.2 assigns the $C JS property to the global Window namespace, which might allow remote attackers to obtain sensitive logged-in username and version-related information via a crafted webpage.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Mar/89 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/540346/100/0/threaded | Exploit VDB Entry Third Party Advisory |
http://www.securityfocus.com/bid/97265 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/97286 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038170 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41779/ | Exploit Third Party Advisory VDB Entry |
https://www.splunk.com/view/SP-CAAAPZ3#InformationLeakageviaJavaScriptCVE20175607 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2017-04-10 15:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-5607
Mitre link : CVE-2017-5607
CVE.ORG link : CVE-2017-5607
JSON object : View
Products Affected
splunk
- splunk
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor