CVE-2017-17067
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Splunk Web in Splunk Enterprise 7.0.x before 7.0.0.1, 6.6.x before 6.6.3.2, 6.5.x before 6.5.6, 6.4.x before 6.4.9, and 6.3.x before 6.3.12, when the SAML authType is enabled, mishandles SAML, which allows remote attackers to bypass intended access restrictions or conduct impersonation attacks.
Splunk Web en Splunk Enterprise en versiones 7.0.x anteriores a la 7.0.0.1; versiones 6.6.x anteriores a la 6.6.3.2; versiones 6.5.x anteriores a la 6.5.6; versiones 6.4.x anteriores a la 6.4.9 y versiones 6.3.x anteriores a la 6.3.12, cuando SAML authType está habilitado, gestiona SAML de manera incorrecta, lo que permite que atacantes remotos omitan las restricciones de acceso planeadas o lleven a cabo ataques de suplantación.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-29 CVE Reserved
- 2017-11-30 CVE Published
- 2023-04-22 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-863: Incorrect Authorization
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/102005 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.splunk.com/view/SP-CAAAP3K | 2019-10-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.3.0 < 6.3.12 Search vendor "Splunk" for product "Splunk" and version " >= 6.3.0 < 6.3.12" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.4.0 < 6.4.9 Search vendor "Splunk" for product "Splunk" and version " >= 6.4.0 < 6.4.9" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.5.0 < 6.5.6 Search vendor "Splunk" for product "Splunk" and version " >= 6.5.0 < 6.5.6" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.6.0 < 6.6.3.2 Search vendor "Splunk" for product "Splunk" and version " >= 6.6.0 < 6.6.3.2" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 7.0.0 < 7.0.0.1 Search vendor "Splunk" for product "Splunk" and version " >= 7.0.0 < 7.0.0.1" | enterprise |
Affected
|