CVE-2017-5607
Splunk Enterprise 5.0.x before 5.0.18, 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.13.1, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3 and Splunk Light before 6.5.2 assigns the $C JS property to the global Window namespace, which might allow remote attackers to obtain sensitive logged-in username and version-related information via a crafted webpage.
Published
2017-04-10T15:59:00.393
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 3.5 (LOW)
CVSSv2 Vector
AV:N/AC:M/Au:S/C:P/I:N/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: SINGLE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
6.8
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt
Exploit, Third Party Advisory
([email protected])
-
http://seclists.org/fulldisclosure/2017/Mar/89
Exploit, Mailing List, Third Party Advisory
([email protected])
-
http://www.securityfocus.com/archive/1/540346/100/0/threaded
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/97265
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/97286
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1038170
Third Party Advisory, VDB Entry
([email protected])
-
https://www.exploit-db.com/exploits/41779/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
https://www.splunk.com/view/SP-CAAAPZ3#InformationLeakageviaJavaScriptCVE20175607
Vendor Advisory
([email protected])
-
http://hyp3rlinx.altervista.org/advisories/SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/fulldisclosure/2017/Mar/89
Exploit, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/540346/100/0/threaded
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/97265
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/97286
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1038170
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/41779/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.splunk.com/view/SP-CAAAPZ3#InformationLeakageviaJavaScriptCVE20175607
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)