CVE-2016-10126

Splunk Web in Splunk Enterprise 5.0.x before 5.0.17, 6.0.x before 6.0.13, 6.1.x before 6.1.12, 6.2.x before 6.2.12, 6.3.x before 6.3.8, and 6.4.x before 6.4.4 allows remote attackers to conduct HTTP request injection attacks and obtain sensitive REST API authentication-token information via unspecified vectors, aka SPL-128840.
References
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:5.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.10:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.6:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.7:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.14:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.11:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.12:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.8:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.15:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.16:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:5.0.9:*:*:*:enterprise:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:splunk:splunk:6.0.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.10:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.11:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.12:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.6:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.7:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.8:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.0.3:*:*:*:enterprise:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:splunk:splunk:6.1.11:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.7:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.8:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.10:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.1.6:*:*:*:enterprise:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:splunk:splunk:6.2.10:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.11:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.6:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.7:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.8:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.2.9:*:*:*:enterprise:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:splunk:splunk:6.3.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.4:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.7:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.6:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.3.2:*:*:*:enterprise:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:splunk:splunk:6.4.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.4.3:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.4.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:6.4.1:*:*:*:enterprise:*:*:*

Information

Published : 2017-01-10 03:59

Updated : 2017-01-17 18:59


NVD link : CVE-2016-10126

Mitre link : CVE-2016-10126


JSON object : View

CWE
CWE-264

Permissions, Privileges, and Access Controls

Advertisement

dedicated server usa

Products Affected

splunk

  • splunk