Splunk Enterprise 6.1.3 addresses two vulnerabilities - August 4, 2014

Table of Contents

Credit

Description

Splunk Enterprise version 6.1.3 addresses the following two vulnerabilities:

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.

Affected Products and Components

The security vulnerabilities addressed by this maintenance release affect Splunk Enterprise when running Splunk Web.

This does not affect: Universal Forwarders.
This does affect: Search heads, Heavy Forwarders with UI turned on, and Indexers with UI turned on.

The following versions of Splunk Enterprise are affected:

  • SPL-85595: Splunk Enterprise 6.1.* before 6.1.3
  • SPL-84887: Splunk Enterprise 6.1.* before 6.1.3

Mitigation and Upgrades

To mitigate this issue, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Credit

Splunk would like to thank and credit Sanehdeep Singh / ControlCase International Pvt. Ltd with the responsible disclosure of issue SPL-85595.

Vulnerability Descriptions and Ratings

Reflective cross-site scripting (XSS) referer header vulnerability in Splunk Enterprise (SPL-85595)

Description: Reflective cross-site scripting (XSS) referer header vulnerability in Splunk Web in Splunk Enterprise 6.1.* before 6.1.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVSS Severity (version 2.0):

CVSS Base Score 4.3
CVSS Impact Subscore 2.9
CVSS Exploitability Subscore 8.6
Overall CVSS Score 4.3

Path traversal vulnerability with search ids in Splunk Enterprise (SPL-84887)

Description: Directory traversal vulnerability in Splunk 6.1.* before 6.1.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a URI to (1) Splunk Web or (2) the Splunkd HTTP Server.

CVSS Severity (version 2.0):

CVSS Base Score 4.0
CVSS Impact Subscore 2.9
CVSS Exploitability Subscore 8.0
Overall CVSS Score 4.0