Splunk 5.0.4 addresses one vulnerability
Table of Contents
Splunk version 5.0.4 addresses the following vulnerability:
- Lack of enforcing X-Frame-Options allows for “Clickjacking” attack on Splunk Web (SPL-65987)(CVE-2013-6772)
At the time of this announcement, Splunk is not aware of any cases where this vulnerability has been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with the vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.
Affected Products and Components
Security vulnerability addressed by this maintenance release affects the following version(s):
- SPL-65987: Splunk 5.0.3 and all older versions
Mitigate with Upgrades
To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.
Splunk would like to thank and credit the Voltage security team with the responsible disclosure of this issue.
Vulnerability Descriptions and Rating
Lack of X-Frame-Options support allows for “Clickjacking” attack on Splunk Web (SPL-65987)(CVE-2013-6772)
Description: The inability to control splunk web UI content being embedded in HTML <frames> or <iframes> in web sites hosted from different (untrusted origins) allows remote attackers to conduct what is known as Clickjacking against an unsuspecting Splunk Web user via a malicious site. To improve the protection of web applications against Clickjacking, in 2009 and 2010 many browser vendors introduced the use of a non-standard http header (RFC 2616) "X-Frame-Options," which declares a policy communicated from a host to the client browser specifying whether the transmitted content is allowed or must not be displayed in frames of other pages from different (potentially untrusted) origins. The "X-Frame-Options" setting allows a secure web page from host B to declare that its content (e.g. button, link, text) must not be displayed in a frame of another page (e.g. from host A). Clickjacking is considered to be a Low to Medium level severity issue and not a direct, persistent attack on a Splunk server, but rather an easier way to misrepresent the Splunk Web UI by rendering it as a part of a malicious site.
To address this issue, we have added an X-FRAME-OPTIONS response header set to SAMEORIGIN to all pages served by Splunk, with the ability to override this new default setting in the web.conf configuration file.
CVSS Severity (version 2.0):
|CVSS Base Score||5|
|CVSS Impact Subscore||2.9|
|CVSS Exploitability Subscore||10|
|Overall CVSS Score||1|
- 2013-July-29: Rev 1. Initial Release