Splunk Enterprise 6.0.4 addresses one vulnerability
Table of Contents
Splunk Enterprise version 6.0.4 addresses the following vulnerability:
At the time of this announcement, Splunk is not aware of any cases where this vulnerability has been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.
Affected Products and Components
The security vulnerability addressed by this maintenance release affects versions:
- SPL-79922: Splunk Enterprise 6.0.0, 6.0.1, 6.0.2, 6.0.3; Affects all versions after 6.0 and before 6.0.4.
Mitigation and Upgrades
To mitigate this issue, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.
Splunk would like to thank and credit Hung-Chi Su at chroot.org with the responsible disclosure of this issue.
Vulnerability Descriptions and Ratings
Stored XSS from CSV File Upload in Splunk Web (SPL-79922, CVE-2014-3147)
Description: When an authenticated user uploads a CSV file with an XSS pattern, the search box auto-complete function may be exposed to a stored XSS vulnerability.
CVSS Severity (version 2.0):
|CVSS Base Score||2.9|
|CVSS Impact Subscore||2.9|
|CVSS Exploitability Subscore||5.5|
|Overall CVSS Score||3.5|
- 2014-May-9: Rev 1. Initial Release
- 2014-May-14: Rev 2. Assigned CVE; Credited Hung-Chi Su