#VU15456 Path traversal in Splunk Enterprise and Splunk Light


Published: 2018-10-22

Vulnerability identifier: #VU15456

Vulnerability risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-7431

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Splunk Enterprise
Server applications / IDS/IPS systems, Firewalls and proxy servers
Splunk Light
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor: Splunk Inc.

Description

The vulnerability allows a remote attacker to conduct a path traversal attack on the target system.

The vulnerability exists in the Django App component  due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted request that submits malicious directory traversal characters and download arbitrary files from the Django App component of the affected application, which could be used to conduct further attacks.

Mitigation
Update Splunk Enterprise to 6.0.14, 6.1.13, 6.2.14, 6.3.10, 6.4.6, 6.5.3.
Update Splunk Light to version 6.6.0.

Vulnerable software versions

Splunk Enterprise: 6.2.0 - 6.2.13, 6.3.0 - 6.3.9, 6.4.0 - 6.4.5, 6.5.0 - 6.5.2, 6.0.0 - 6.0.13, 6.1.0 - 6.1.12

Splunk Light: 6.2.2 - 6.5.3


External links
http://www.splunk.com/view/SP-CAAAP5T


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability