Splunk Enterprise 6.2.4 and Splunk Light 6.2.4 address two vulnerabilities

Advisory ID: SP-CAAAN7C

CVE ID: -

Published: 2015-07-07

Last Update: 2015-07-07

CVSSv3.1 Score: -, Medium

CVSSv3.1 Vector: -

CWE: -

Bug ID: SPL-101718, SPL-100313

Description

Splunk Enterprise 6.2.4 and Splunk Light 6.2.4 address two vulnerabilities.

  • Persistent cross-site scripting via Dashboard (SPL-100313)
  • Reflected cross-site scripting in Splunk Web (SPL-101718)

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no Common Vulnerabilities and Exposures (CVE) identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2 (CVSS v2).

Affected Products and Components

  • Persistent cross-site scripting via Dashboard (SPL-100313)
    • Affected Versions: Splunk Enterprise 6.2.x before 6.2.4 and Splunk Light 6.2.x before 6.2.4.
    • Affected Components: Search Heads, Heavy Forwarders with Splunk Web enabled.
    • Unaffected Components: Heavy Forwarders without Splunk Web enabled, Universal Forwarders and Indexers
  • Reflected cross-site scripting in Splunk Web (SPL-101718)
    • Affected Versions: Splunk Enterprise 6.2.x before 6.2.4, 6.1.x before 6.1.8, 6.0.x before 6.0.9, 5.0.x before 5.0.13, and Splunk Light 6.2.x before 6.2.4
    • Affected Components: Search Heads, Heavy Forwarders with Splunk Web enabled.
    • Unaffected Components: Indexers, Deployment Server, Heavy Forwarders without Splunk Web enabled, Universal Forwarders.

      Mitigation and Upgrades

      To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk Enterprise and Splunk Light releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

Persistent cross-site scripting via Dashboard (SPL-100313)

Description: A cross-site scripting vulnerability in Splunk Enterprise and Splunk Light allows remote authenticated users to inject arbitrary JavaScript.

Credit

Splunk would like to thank Daniel Compton @ Info-Assure for privately reporting this vulnerability.

CVSS Severity (version 2.0):

CVSS Base Score 4.9

CVSS Impact Subscore 4.9

CVSS Exploitability Subscore 6.8

Overall CVSS Score 4.9

Reflected cross-site scripting in Splunk Web (SPL-101718)

Description: A reflected cross-site scripting vulnerability in Splunk Enterprise and Splunk Light could permit a remote users to inject arbitrary JavaScript via a malicious header.

CVSS Severity (version 2.0):

CVSS Base Score 3.6

CVSS Impact Subscore 4.9

CVSS Exploitability Subscore 3.9

Overall CVSS Score 3.6

Document History

  • 2015-Jul-07: Rev 1. Initial Release