Vulnerability identifier: #VU15456
Vulnerability risk: Low
CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Splunk Enterprise
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Splunk Light
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Vendor: Splunk Inc.
Description
The vulnerability allows a remote attacker to conduct a path traversal attack on the target system.
The vulnerability exists in the Django App component due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted request that submits malicious directory traversal characters and download arbitrary files from the Django App component of the affected application, which could be used to conduct further attacks.
Mitigation
Update Splunk Enterprise to 6.0.14, 6.1.13, 6.2.14, 6.3.10, 6.4.6, 6.5.3.
Update Splunk Light to version 6.6.0.
Vulnerable software versions
Splunk Enterprise: 6.2.0 - 6.2.13, 6.3.0 - 6.3.9, 6.4.0 - 6.4.5, 6.5.0 - 6.5.2, 6.0.0 - 6.0.13, 6.1.0 - 6.1.12
Splunk Light: 6.2.2 - 6.5.3
External links
http://www.splunk.com/view/SP-CAAAP5T
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.