Skip to main content


Splunk Enterprise 6.0.6 addresses two vulnerabilities


Splunk Enterprise version 6.0.6 addresses the following vulnerabilities:

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.

Affected Products and Components

These vulnerabilities affect all versions of Splunk Enterprise 6.0.* before 6.0.6:

  • OpenSSL TLS protocol downgrade attack (SPL-88587, CVE-2014-3511)
    • This does affect: All Splunk components where SSL is enabled.
    • Note: Splunk expects to address OpenSSL vulnerabilities for currently supported versions in the upcoming maintenance releases of Splunk Enterprise.
  • Reflective cross-site scripting (XSS) referer header vulnerability (SPL-85360)
    • This does not affect: Universal Forwarders.
    • This does affect: Search Heads, Heavy Forwarders with UI turned on, and Indexers with UI turned on.

Mitigation and Upgrades

To mitigate this issue, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

OpenSSL TLS protocol downgrade attack (CVE-2014-3511, SPL-88587)

Description: OpenSSL versions before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i does not properly handle fragmented ClientHello messages. This permits a man-in-the-middle attack to force clients to use TLS 1.0 even when both sides support higher protocol versions. The vulnerability impacts all Splunk communications involving SSL including Universal Forwarders, Heavy Forwarders, and Splunk Web

CVSS Severity (version 2.0):

CVSS Base Score4.3
CVSS Impact Subscore4.0
CVSS Exploitability Subscore5.5
Overall CVSS Score4.9

Reflective cross-site scripting (XSS) referer header vulnerability (SPL-85360)

Description: Reflective cross-site scripting (XSS) referer header vulnerability in Splunk Web in Splunk Enterprise 6.0.* before 6.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.


Splunk would like to thank Sanehdeep Singh / ControlCase International Pvt. Ltd, and credit with the responsible disclosure of issue SPL-85360.

CVSS Severity (version 2.0):

CVSS Base Score4.3
CVSS Impact Subscore2.9
CVSS Exploitability Subscore8.6
Overall CVSS Score4.3

Document History

  • 2014-Sep-03: Rev 1. Initial Release
  • 2014-Sep-24: Rev 2. Internal Link Updates

Questions? Submit your question to Splunk Support.