Splunk Enterprise 6.3.11 and Splunk Light 6.5.3 address one vulnerability

Table of Contents

Description

Splunk Enterprise 6.3.11 and Splunk Light 6.5.3 address one vulnerability

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no Common Vulnerabilities and Exposures (CVE) identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2 (CVSS v2).

Affected Products and Components

  • Attacker Influenced Error Messages May Permit Social Engineering (SPL-135602)
    • Affected Product Versions: Splunk Enterprise versions 6.5.x before 6.5.3, 6.4.x before 6.4.7, 6.3.x before 6.3.11, 6.2.x before 6.2.14, 6.1.x before 6.1.14, 6.0.x before 6.0.15, 5.0.x before 5.0.19 and Splunk Light before 6.5.3
    • Affected Components: All Splunk Enterprise components running Splunk Web.

    Mitigation and Upgrades

    To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk Enterprise and Splunk Light releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

    Vulnerability Descriptions and Ratings

    Attacker Influenced Error Messages May Permit Social Engineering (SPL-135602)

    Description: Splunk Enterprise versions 6.5.x before 6.5.3, 6.4.x before 6.4.7, 6.3.x before 6.3.11, 6.2.x before 6.2.14, 6.1.x before 6.1.14, 6.0.x before 6.0.15, 5.0.x before 5.0.19 and Splunk Light before 6.5.3 are affected by a vulnerability that could permit an attacker to perform social engineering by causing Splunk software to display an attacker controlled message when a user visits a specific URL.

    CVSS Severity (version 2.0):

    CVSS Base Score4.0
    CVSS Impact Subscore2.9
    CVSS Exploitability Subscore8.0
    Overall CVSS Score3.5