First published: Thu Aug 07 2014(Updated: )
Directory traversal vulnerability in the collect script in Splunk before 5.0.5 allows remote attackers to execute arbitrary commands via a .. (dot dot) in the file parameter. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2013-7394 is for the issue in the "runshellscript echo.sh" script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | <=5.0.4 | |
Splunk | =5.0 | |
Splunk | =5.0.1 | |
Splunk | =5.0.2 | |
Splunk | =5.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6771 is considered a critical vulnerability due to its ability to allow remote attackers to execute arbitrary commands.
To fix CVE-2013-6771, upgrade your Splunk instance to version 5.0.5 or later.
CVE-2013-6771 affects Splunk versions prior to 5.0.5, including all versions from 5.0 to 5.0.4.
Yes, CVE-2013-6771 can lead to unauthorized access as it allows attackers to execute arbitrary commands on the server.
There is no effective workaround for CVE-2013-6771, and updating to a fixed version is necessary to protect against the vulnerability.