CVE-2018-7431
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in the Splunk Django App in Splunk Enterprise 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allows remote authenticated users to read arbitrary files via unspecified vectors.
Vulnerabilidad de salto de directorio en Splunk Django App en versiones 6.0.x anteriores a la 6.0.14, versiones 6.1.x anteriores a la 6.1.13, versiones 6.2.x anteriores a la 6.2.14, versiones 6.3.x anteriores a la 6.3.10, versiones 6.4.x anteriores a la 6.4.6,y versiones 6.5.x anteriores a la 6.5.3; y en Splunk Light en versiones anteriores a la 6.6.0 permite que los usuarios autenticados remotos lean archivos arbitrarios utilizando vectores no especificados.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-02-23 CVE Reserved
- 2018-10-23 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.splunk.com/view/SP-CAAAP5T | 2019-01-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | < 6.6.0 Search vendor "Splunk" for product "Splunk" and version " < 6.6.0" | light |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.0.0 < 6.0.14 Search vendor "Splunk" for product "Splunk" and version " >= 6.0.0 < 6.0.14" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.1.0 < 6.1.13 Search vendor "Splunk" for product "Splunk" and version " >= 6.1.0 < 6.1.13" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.2.0 < 6.2.14 Search vendor "Splunk" for product "Splunk" and version " >= 6.2.0 < 6.2.14" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.3.0 < 6.3.10 Search vendor "Splunk" for product "Splunk" and version " >= 6.3.0 < 6.3.10" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.4.0 < 6.4.6 Search vendor "Splunk" for product "Splunk" and version " >= 6.4.0 < 6.4.6" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 6.5.0 < 6.5.3 Search vendor "Splunk" for product "Splunk" and version " >= 6.5.0 < 6.5.3" | enterprise |
Affected
|