Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-7431


Directory traversal vulnerability in the Splunk Django App in Splunk Enterprise 6.0.x before 6.0.14, 6.1.x before 6.1.13, 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.6, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allows remote authenticated users to read arbitrary files via unspecified vectors.


Published

2018-10-23T21:31:39.257

Last Modified

2024-11-21T04:12:06.990

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application splunk splunk < 6.6.0 Yes
Application splunk splunk < 6.0.14 Yes
Application splunk splunk < 6.1.13 Yes
Application splunk splunk < 6.2.14 Yes
Application splunk splunk < 6.3.10 Yes
Application splunk splunk < 6.4.6 Yes
Application splunk splunk < 6.5.3 Yes

References