Skip to main content

Splunk Web Input Validation Vulnerability

Last Update Date: 2 Apr 2013 15:13 Release Date: 2 Apr 2013 4254 Views

RISK: Medium Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

A vulnerability was identified in Splunk Web. A remote user can conduct cross-site scripting attacks.

 

Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.


Impact

  • Cross-Site Scripting
  • Remote Code Execution
  • Information Disclosure
  • Data Manipulation

System / Technologies affected

  • Splunk version 4.3.0 through 4.3.5

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • The vendor has issued a fix (4.3.6)

Vulnerability Identifier

  • No CVE information is available

Source


Related Link