Splunk Web in Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.5, 6.3.x before 6.3.9, 6.2.x before 6.2.13, 6.1.x before 6.1.12, 6.0.x before 6.0.13, 5.0.x before 5.0.17 and Splunk Light versions before 6.5.2 allows remote authenticated users to cause a denial of service (daemon crash) via a crafted GET request, aka SPL-130279.
References
Link | Resource |
---|---|
http://www.splunk.com/view/SP-CAAAPW8 | Patch Vendor Advisory |
http://www.splunk.com/view/SP-CAAAPW8 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.splunk.com/view/SP-CAAAPW8 - Patch, Vendor Advisory |
Information
Published : 2017-02-04 05:59
Updated : 2024-11-21 03:28
NVD link : CVE-2017-5880
Mitre link : CVE-2017-5880
CVE.ORG link : CVE-2017-5880
JSON object : View
Products Affected
splunk
- splunk
CWE
CWE-20
Improper Input Validation