Splunk < 5.0.5 Multiple Code Execution Vulnerabilities

high Nessus Plugin ID 70213

Synopsis

The remote web server contains an application that is affected by multiple code execution vulnerabilities.

Description

According to its version number, the Splunk Web hosted on the remote web server is affected by multiple code execution vulnerabilities :

- A directory traversal vulnerability exists in the collect script. A remote attacker can exploit this, using the 'file' parameter, to execute arbitrary commands. (CVE-2013-6771)

- A flaw exists in the 'echo.sh' script that allows a remote, authenticated attacker to execute arbitrary commands on the underlying operating system by using a specially crafted string. (CVE-2013-7394)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Splunk 5.0.5 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-14-052/

https://www.zerodayinitiative.com/advisories/ZDI-14-053/

https://www.splunk.com/view/SP-CAAAH76

http://docs.splunk.com/Special:SpecialLatestDoc?t=Documentation/Splunk/latest/ReleaseNotes/5.0.5

Plugin Details

Severity: High

ID: 70213

File Name: splunk_505.nasl

Version: 1.14

Type: remote

Family: CGI abuses

Published: 9/30/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:splunk:splunk

Required KB Items: installed_sw/Splunk

Exploit Ease: No exploit is required

Patch Publication Date: 9/23/2013

Vulnerability Publication Date: 9/23/2013

Reference Information

CVE: CVE-2013-6771, CVE-2013-7394

BID: 62632, 69169