Splunk Enterprise 6.5.3, 6.2.13.1 and Splunk Light 6.5.2 address multiple vulnerabilities

Advisory ID: SP-CAAAPZ3

CVE ID: -

Published: 2017-05-05

Last Update: 2017-05-12

CVSSv3.1 Score: -, Medium

CVSSv3.1 Vector: -

CWE: -

Bug ID: -

Description

Splunk Enterprise 6.5.3, 6.2.13.1 and Splunk Light 6.5.2 address multiple vulnerabilities

  • Persistent Cross Site Scripting in Splunk Web (SPL-134841)
  • Information Leakage via JavaScript (CVE-2017-5607)

To get the 6.2.13.1 patch for Splunk Enterprise, please open a case with Splunk Customer Support. or give us a call on (855) SPLUNK-S (or any of the numbers listed here: Contact Support).

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no Common Vulnerabilities and Exposures (CVE) identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2 (CVSS v2).

Affected Products and Components

  • Persistent Cross Site Scripting in Splunk Web (SPL-134841)
    • Affected Product Versions: Splunk Enterprise versions 6.5.x before 6.5.3, 6.4.x before 6.4.6, 6.3.x before 6.3.10, 6.2.x before 6.2.13 and Splunk Light before 6.5.2
    • Affected Components: All Splunk Enterprise components running Splunk Web.
  • Information Leakage via JavaScript (CVE-2017-5607)
    • Affected Product Versions: Splunk Enterprise versions 6.5.x before 6.5.3, 6.4.x before 6.4.6, 6.3.x before 6.3.10, 6.2.x before 6.2.13.1, 6.1.x before 6.1.13, 6.0.x before 6.0.14, 5.0.x before 5.0.18 and Splunk Light before 6.5.2
    • Affected Components: All Splunk Enterprise components.

      Mitigation and Upgrades

      To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk Enterprise and Splunk Light releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

Persistent Cross Site Scripting in Splunk Web (SPL-134841)

Description: Splunk Enterprise versions 6.5.x before 6.5.3, 6.4.x before 6.4.6, 6.3.x before 6.3.10, 6.2.x before 6.2.13 and Splunk Light before 6.5.2 are affected by a vulnerability that allows an attacker to inject and store arbitrary script. However, the attacker has to be authenticated in Splunk web before exploiting this vulnerability.

CVSS Severity (version 2.0):

CVSS Base Score 6.6

CVSS Impact Subscore 9.2

CVSS Exploitability Subscore 6.6

Overall CVSS Score 5.0

Information Leakage via JavaScript (CVE-2017-5607)

Description: Splunk Enterprise versions 6.5.x before 6.5.3, 6.4.x before 6.4.6, 6.3.x before 6.3.10, 6.2.x before 6.2.13.1, 6.1.x before 6.1.13, 6.0.x before 6.0.14, 5.0.x before 5.0.18 and Splunk Light before 6.5.2 are affected by a vulnerability that could allow a remote attacker to obtain logged-in username and Splunk version-related information via JavaScript.

Credits: Splunk would like to thank John Page (hyp3rlinx) for reporting this vulnerability.

CVSS Severity (version 2.0):

CVSS Base Score 3.5

CVSS Impact Subscore 2.9

CVSS Exploitability Subscore 6.8

Overall CVSS Score 0.5

Document History

  • 2017-Mar-27: Rev 1. Initial Release
  • 2017-Jul-25: Rev 2. Fixed the typo in Splunk Enterprise version 6.2.x2017-Apr-12: Rev 2. Mitigation and Upgrades