Splunk Enterprise 6.1.4 and 5.0.10 address four vulnerabilities

Advisory ID: SP-CAAANHS

Published: 2014-09-30

Last Update: 2014-11-20

CVSSv3.1 Score: -, 

CVSSv3.1 Vector: -

CWE: -

Bug ID: SPL-88585, SPL-88587, SPL-88588, SPL-89216, SPL-85579, SPL-85360

Description

Splunk Enterprise versions 6.1.4 and 5.0.10 address the following vulnerabilities:

  • OpenSSL TLS protocol downgrade attack (SPL-88585, SPL-88587, SPL-88588, CVE-2014-3511)
  • Persistent cross-site scripting (XSS) via Dashboard (SPL-89216, CVE-2014-5466)
  • Persistent cross-site scripting (XSS) via Event Parsing (SPL-85579)
  • Reflective cross-site scripting (XSS) referer header vulnerability (SPL-85360)

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.

Affected Products and Components

Security vulnerability addressed by this maintenance release affects the following version(s):

  • OpenSSL TLS protocol downgrade attack (SPL-88585, SPL-88587, SPL-88588, CVE-2014-3511)
    • Affected versions: All versions of Splunk Enterprise 6.1.x before 6.1.4, 6.0.x before 6.0.6, and 5.0.x before 5.0.10.
    • This does affect: All Splunk components where SSL is enabled.
  • Persistent cross-site scripting (XSS) via Dashboard (SPL-89216, CVE-2014-5466)
    • Affected versions: All versions of Splunk Enterprise 6.1.x before 6.1.4, 6.0.x before 6.0.6, and 5.0.x before 5.0.10.
    • This does not affect: universal forwarders.
    • This does affect: search heads, heavy forwarders with Splunk Web enabled, and indexers with Splunk Web enabled.
  • Persistent cross-site scripting (XSS) via Event Parsing (SPL-85579)
    • Affected versions: All versions of Splunk Enterprise 6.1.x before 6.1.3, 6.0.x before 6.0.6, and 5.0 before 5.0.10.
    • This does not affect: universal forwarders.
    • This does affect: search heads, heavy forwarders with Splunk Web enabled, and indexers with Splunk Web enabled.
  • Reflective cross-site scripting (XSS) referer header vulnerability (SPL-85360)
    • Affected versions: All versions of Splunk Enterprise 5.0 before 5.0.10.
    • This does not affect: universal forwarders.
    • This does affect: search heads, heavy forwarders with Splunk Web enabled, and indexers with Splunk Web enabled.

      Mitigate with Upgrades

      To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

OpenSSL TLS protocol downgrade attack (SPL-88585, SPL-88587, SPL-88588, CVE-2014-3511)

Description: OpenSSL versions before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i does not properly handle fragmented ClientHello messages. This permits a man-in-the-middle attack to force clients to use TLS 1.0 even when both sides support higher protocol versions. The vulnerability impacts all Splunk communications involving SSL including universal forwarders, heavy forwarders, and Splunk Web.

CVSS Severity (version 2.0):

CVSS Base Score 4.3

CVSS Impact Subscore 2.9

CVSS Exploitability Subscore 8.6

Overall CVSS Score 4.3

Persistent cross-site scripting (XSS) in Dashboard (SPL-89216, CVE-2014-5466)

Description: Persistent cross-site scripting (XSS) dashboard vulnerability in Splunk Web in Splunk Enterprise 6.1.x before 6.1.4, 6.0.x before 6.0.6, and 5.0.x before 5.0.10 allows remote attackers to inject arbitrary script.

Credit

Splunk would like to thank Adam Bell / Lateral Security for the the responsible disclosure of issue SPL-89216.

CVSS Severity (version 2.0):

CVSS Base Score 6.5

CVSS Impact Subscore 6.4

CVSS Exploitability Subscore 8.0

Overall CVSS Score 6.5

Persistent cross-site scripting (XSS) in Event Parsing (SPL-85579)

Description: Persistent cross-site scripting (XSS) event vulnerability in Splunk Web in Splunk Enterprise 6.1.x before 6.1.4 and 6.0.x before 6.0.6.

CVSS Severity (version 2.0):

CVSS Base Score 6.5

CVSS Impact Subscore 6.4

CVSS Exploitability Subscore 10.0

Overall CVSS Score 7.5

Reflective cross-site scripting (XSS) referer header vulnerability (SPL-85360)

Description: Reflective cross-site scripting (XSS) referer header vulnerability in Splunk Web in Splunk Enterprise 5.0.x before 5.0.10 allows remote attackers to inject arbitrary script.

Credit

Splunk would like to thank Sanehdeep Singh / ControlCase International Pvt. Ltd, and credit with the responsible disclosure of issue SPL-85360.

CVSS Severity (version 2.0):

CVSS Base Score 6.5

CVSS Impact Subscore 6.4

CVSS Exploitability Subscore 8.0

Overall CVSS Score 6.5

Document History

  • 2014-Sep-30: Rev 1. Initial Release
  • 2014-Oct-22: Rev 2. Updating missing credit for Adam Bell SPL-89216.
  • 2014-Oct-31: Rev 3. Updating to add CVE-2014-5466 to SPL-89216.
  • 2014-Nov-20: Rev 4. Updated SPL-89216 as fixed in 6.0.7 instead of 6.0.6.