First published: Tue Oct 23 2018(Updated: )
Directory traversal vulnerability in the Splunk Django App in Splunk Enterprise 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allows remote authenticated users to read arbitrary files via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | <6.6.0 | |
Splunk | >=6.0.0<6.0.14 | |
Splunk | >=6.1.0<6.1.13 | |
Splunk | >=6.2.0<6.2.14 | |
Splunk | >=6.3.0<6.3.10 | |
Splunk | >=6.4.0<6.4.6 | |
Splunk | >=6.5.0<6.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7431 has a medium severity rating, allowing remote authenticated users to exploit a directory traversal vulnerability.
To fix CVE-2018-7431, upgrade Splunk Enterprise to version 6.0.14 or later, or 6.1.13 or later, depending on your version.
CVE-2018-7431 affects remote authenticated users of Splunk Enterprise versions prior to 6.0.14, 6.1.13, 6.2.14, 6.3.10, 6.4.6, and 6.5.3 as well as Splunk Light versions before 6.6.0.
CVE-2018-7431 allows an attacker to read arbitrary files on the server due to a directory traversal vulnerability.
There are no official workarounds for CVE-2018-7431, and the recommended action is to upgrade to a patched version.