Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:splunk:splunk:6.3.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "017E3E44-C062-463F-B9D3-75BA57992C91", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A2BB5352-F0AF-4578-979A-7E7D3259A94A", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "011F96AC-580A-4798-82F9-5D7CF80505DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.3:*:*:*:enterprise:*:*:*", "matchCriteriaId": "8B2CE702-BB9A-426C-ADE1-6CC0CD96A2CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.4:*:*:*:enterprise:*:*:*", "matchCriteriaId": "51ABD86F-DD27-43D6-AC0C-BE8E7B5A6308", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.5:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EED5369E-4539-4598-85C9-00384CBB7410", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.6:*:*:*:enterprise:*:*:*", "matchCriteriaId": "963C3008-04D5-4331-89E9-09FEC12FEC17", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.7:*:*:*:enterprise:*:*:*", "matchCriteriaId": "6C85C2D3-FA71-47C4-9BA1-1008F033E24A", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.3.8:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A7686091-ABEF-4EA3-B9EC-9B09C7B05FD4", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.4.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D0BDC526-0F46-41E6-B723-D93A5FA288B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.4.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "9BCB1613-C716-4147-9E1E-0FCAD800DE1D", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.4.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "FF59568E-ECF4-4AF9-9F70-01AB67CEACA6", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.4.3:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AA23CDDF-349C-4028-B857-FA1837BBEBEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.4.4:*:*:*:enterprise:*:*:*", "matchCriteriaId": "6169CE4B-429B-4DB8-B2D1-8AEAAB1BFB23", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.4.5:*:*:*:enterprise:*:*:*", "matchCriteriaId": "40B5692A-74AE-4B06-9E6A-A8DD83AB394D", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.5.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EB11750A-BE9D-450C-856B-550DE8B0A55C", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.5.0:*:*:*:light:*:*:*", "matchCriteriaId": "4FACB46B-623A-460A-B8A8-59762632067B", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.5.1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "61B46B1C-70A9-4959-998B-1B9927378CE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:splunk:splunk:6.5.1:*:*:*:light:*:*:*", "matchCriteriaId": "DAFEA182-7B21-4E96-86F2-67DC7E5DA4E3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Persistent Cross Site Scripting (XSS) exists in Splunk Enterprise 6.5.x before 6.5.2, 6.4.x before 6.4.6, and 6.3.x before 6.3.9 and Splunk Light before 6.5.2, with exploitation requiring administrative access, aka SPL-134104."}, {"lang": "es", "value": "Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) persistente en Splunk Enterprise 6.5.x anterior a 6.5.2; 6.4.x anterior a 6.4.6; y 6.3.x anterior a 6.3.9 y Splunk Light anterior a 6.5.2, cuya explotaci\u00f3n requiere acceso de administrador, tambi\u00e9n conocido como SPL-134104."}], "id": "CVE-2017-12572", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-08-05T21:29:00.177", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.splunk.com/view/SP-CAAAPYC"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.splunk.com/view/SP-CAAAPYC"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}