Splunk Enterprise 7.0.0.1/7.0.1, 6.6.3.2/6.6.4, 6.5.6, 6.4.9 and 6.3.12 address multiple SAML vulnerabilitiesSplunk Enterprise and Splunk Light address multiple vulnerabilities
Advisory ID: SP-CAAAP3K
CVE ID: -
Published: 2017-11-14
Last Update: 2017-11-14
CVSSv3.1 Score: -, Critical
CVSSv3.1 Vector: -
CWE: -
Bug ID: -
Description
Splunk Enterprise 7.0.0.1/7.0.1, 6.6.3.2/6.6.4, 6.5.6, 6.4.9 and 6.3.12 address multiple SAML vulnerabilities.
1- Multiple SAML implementation vulnerabilities in Splunk Enterprise (CVE-2017-17067)
Please note, as of 2017-Nov-14, all affected Splunk Cloud customers have been updated.
At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no Common Vulnerabilities and Exposures (CVE) identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2 (CVSS v2).
Affected Products and Components
Multiple SAML implementation vulnerabilities in Splunk Enterprise (CVE-2017-17067)
Affected Product Versions
Splunk Enterprise versions 7.0.x before 7.0.0.1/7.0.1, 6.6.x before 6.6.3.2/6.6.4, 6.5.x before 6.5.6, 6.4.x before 6.4.9, 6.3.x before 6.3.12. All Splunk cloud instances using SAML have been updated to 6.6.3.2.
Affected Components
All Splunk Enterprise components running Splunk Web with SAML authentication enabled.
Unaffected Components
Universal Forwarders and Splunk Enterprise instances where Splunk Web is disabled or not using SAML authentication.
Mitigation and Upgrades
- Check if you are running one of the following Splunk Enterprise versions
- 7.0.x before 7.0.0.1/7.0.1
- 6.6.x before 6.6.3.2/6.6.4
- 6.5.x before 6.5.6
- 6.4.x before 6.4.9
- 6.3.x before 6.3.12
$SPLUNK_HOME/bin/splunk version
- Check if you have SAML login enabled.
Linux:
$SPLUNK_HOME/bin/splunk btool authentication list | grep authType
Windows:
$SPLUNK_HOME\bin\splunk btool authentication list | find “authType”
If ‘authType’ contains the word ‘SAML’, then this indicates a vulnerable configuration of Splunk and should be patched immediately.
For more information, see the SAML Troubleshooting documentation.
To mitigate this issue, Splunk recommends upgrading to one of the latest releases and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk Enterprise releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.
Vulnerability Descriptions and Ratings
Multiple SAML implementation vulnerabilities in Splunk Enterprise (CVE-2017-17067)
Description
Splunk Enterprise versions 7.0.x before 7.0.0.1/7.0.1, 6.6.x before 6.6.3.2/6.6.4, 6.5.x before 6.5.6, 6.4.x before 6.4.9, 6.3.x before 6.3.12 are vulnerable to multiple SAML vulnerabilities. The most severe of these vulnerabilities can permit an unauthenticated attacker access to a SAML-enabled Splunk Web or permit an authenticated user to impersonate another user or role.
Credits
Splunk would like to thank Jacob Honoroff for reporting a portion of this issue.
CVSS Severity (version 2.0):
CVSS Base Score 10.0
CVSS Impact Subscore 10.0
CVSS Exploitability Subscore 10.0
Overall CVSS Score 10.0
Document History
- 2017-Nov-14: Rev 1. Initial Release
- 2017-Nov-15: Rev 2. Alteration of 6.6.3.2 to 6.6.4 and corrected typos
- 2017-Nov-17: Rev 3. Updated download instructions
- 2017-Nov-28: Rev 4. Updated to clarify what versions are patched in Cloud (6.6.3.2)
- 2017-Nov-30: Rev 5. Alteration of 7.0.0.1 to 7.0.1 and Updated CVE