Data: CASIE
Negative Trigger
several
vulnerabilities
in
Enterprise
and
Light
products
,
some
of
them
have
been
rated
“
high
severity.
”
Splunk
Enterprise
solution
allows
organizations
to
aggregate
,
search
,
analyze
,
and
visualize
data
from
various
sources
that
are
critical
to
business
operations
.
The
Splunk
Light
is
a
comprehensive
solution
for
small
IT
environments
that
automates
log
analysis
and
integrate
server
and
network
monitoring
.
“
To
mitigate
these
issues
,
Splunk
recommends
upgrading
Vulnerability-related.PatchVulnerability
to
the
latest
release
and
applying
Vulnerability-related.PatchVulnerability
as
many
of
the
Hardening
Standards
from
the
Securing
Splunk
documentation
as
are
relevant
to
your
environment
.
Splunk
Enterprise
and
Splunk
Light
releases
are
cumulative
,
meaning
that
future
releases
will
contain
fixes
to
these
vulnerabilities
,
new
features
and
other
bug
fixes
,
”
reads
the
advisory published
Vulnerability-related.PatchVulnerability
by
Splunk
.
The
most
severe
issue
fixed
Vulnerability-related.PatchVulnerability
by
the
company
is
a
high
severity
cross-site
scripting
(
XSS
)
flaw
in
the
Web
interface
,
tracked as
Vulnerability-related.DiscoverVulnerability
CVE-2018-7427
,
that
received
the
CVSS
score
of
8.1
.
Another
severe
vulnerability
is
a
DoS
flaw
tracked as
Vulnerability-related.DiscoverVulnerability
CVE-2018-7432
that
could
be exploited
Vulnerability-related.DiscoverVulnerability
using
malicious
HTTP
requests
sent
to
Splunkd
that
is
the
system
process
that
handles
indexing
,
searching
and
forwarding
.
This
issue
was
tracked as
Vulnerability-related.DiscoverVulnerability
“
medium
severity
”
by
the
company
.
The
company
also
addressed
Vulnerability-related.PatchVulnerability
a
denial-of-service
(
DoS
)
vulnerability
,
tracked as
Vulnerability-related.DiscoverVulnerability
CVE-2018-7429
,
that
could
be exploited
Vulnerability-related.DiscoverVulnerability
by
an
attacker
by
sending
a
specially
crafted
HTTP
request
to
Splunkd
.
The
last
flaw
addressed
Vulnerability-related.PatchVulnerability
by
the
vendor
,
tracked as
Vulnerability-related.DiscoverVulnerability
CVE-2018-7431
,
is
a
path
traversal
issue
that
allows
an
authenticated
attacker
to
download
arbitrary
files
from
the
vendor
Django
app
.
The
vulnerability
has
been rated
Vulnerability-related.DiscoverVulnerability
“
medium
severity.
”
The
vendor
declared
it
has
found
Vulnerability-related.DiscoverVulnerability
no
evidence
that
these
vulnerabilities
have
been exploited
Vulnerability-related.DiscoverVulnerability
in
attacks
in
the
wild
.