Splunk 4.x < 4.1.3 404 Response XSS

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.


Synopsis :

The remote web server contains an application that is affected by a
cross-site scripting vulnerability.

Description :

The version of Splunk Web hosted on the remote web server is affected
by a cross-site scripting vulnerability due to a failure to sanitize
the contents of the HTTP 'Referer' header before using it in HTTP
error 404 messages. An unauthenticated, remote attacker can exploit
this issue to inject arbitrary HTML or script code into a user's
browser to be executed within the security context of the affected
site.

Note that exploitation is only confirmed as valid in Internet Explorer
since Firefox escapes the special characters '<' and '>' when
rendering a link.

See also :

http://www.splunk.com/view/SP-CAAAFHY
http://www.splunk.com/base/Documentation/4.1.3/ReleaseNotes/4.1.3

Solution :

Upgrade to Splunk 4.1.3 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 47620 ()

Bugtraq ID: 73536

CVE ID: CVE-2010-2429