CVE-2016-4856

Cross-site scripting vulnerability in Splunk Enterprise 6.3.x prior to 6.3.5 and Splunk Light 6.3.x prior to 6.3.5 allows attacker with administrator rights to inject arbitrary web script or HTML via unspecified vectors.
References
Link Resource
http://www.securityfocus.com/bid/92990 Third Party Advisory VDB Entry
https://jvn.jp/en/jp/JVN71462075/index.html Third Party Advisory VDB Entry
https://www.splunk.com/view/SP-CAAAPN9 Vendor Advisory
http://www.securityfocus.com/bid/92990 Third Party Advisory VDB Entry
https://jvn.jp/en/jp/JVN71462075/index.html Third Party Advisory VDB Entry
https://www.splunk.com/view/SP-CAAAPN9 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:6.3.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.0:*:*:*:light:*:*:*
cpe:2.3:a:splunk:splunk:6.3.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.1:*:*:*:light:*:*:*
cpe:2.3:a:splunk:splunk:6.3.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.2:*:*:*:light:*:*:*
cpe:2.3:a:splunk:splunk:6.3.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.3:*:*:*:light:*:*:*
cpe:2.3:a:splunk:splunk:6.3.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.4:*:*:*:light:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/92990 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92990 - Third Party Advisory, VDB Entry
References () https://jvn.jp/en/jp/JVN71462075/index.html - Third Party Advisory, VDB Entry () https://jvn.jp/en/jp/JVN71462075/index.html - Third Party Advisory, VDB Entry
References () https://www.splunk.com/view/SP-CAAAPN9 - Vendor Advisory () https://www.splunk.com/view/SP-CAAAPN9 - Vendor Advisory

Information

Published : 2017-05-12 18:29

Updated : 2024-11-21 02:53


NVD link : CVE-2016-4856

Mitre link : CVE-2016-4856

CVE.ORG link : CVE-2016-4856


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')