First published: Thu Aug 07 2014(Updated: )
The "runshellscript echo.sh" script in Splunk before 5.0.5 allows remote authenticated users to execute arbitrary commands via a crafted string. NOTE: this issue was SPLIT from CVE-2013-6771 per ADT2 due to different vulnerability types.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | <=5.0.4 | |
Splunk | =5.0 | |
Splunk | =5.0.1 | |
Splunk | =5.0.2 | |
Splunk | =5.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7394 is considered to be of medium severity due to the potential for remote command execution by authenticated users.
To fix CVE-2013-7394, upgrade to Splunk version 5.0.5 or later.
CVE-2013-7394 affects all versions of Splunk prior to 5.0.5, including 5.0, 5.0.1, 5.0.2, 5.0.3, and 5.0.4.
CVE-2013-7394 allows remote authenticated users to execute arbitrary commands via a crafted string in the 'runshellscript echo.sh' script.
Yes, CVE-2013-7394 was split from CVE-2013-6771 due to its different vulnerability type.