Untrusted TLS server certs verification is not present (CVE-2019-5729)
Advisory ID: SP-CAAAQAD
CVE ID: CVE-2019-5729
Published: 2019-01-14
Last Update: 2019-01-14
CVSSv3.1 Score: -, High
CVSSv3.1 Vector: -
CWE: -
Bug ID: -
Description
At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no Common Vulnerabilities and Exposures (CVE) identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 3.0 (CVSS v3.0).
Affected Products and Components
Untrusted TLS server certs verification is not present (CVE-2019-5729)
Affected Product Versions
- Splunk-SDK-Python version before 1.6.6.
- Affected Components: All Splunk Enterprise components running Splunk Web.
Mitigation and Upgrades
To mitigate these issues, Splunk recommends upgrading to latest splunk-sdk-python library
Vulnerability Descriptions and Ratings
Untrusted TLS server certs verification is not present (CVE-2019-5729)
Description
Splunk-SDK-Python version before 1.6.6 does not properly verify untrusted TLS server certificates. This could would permit man-in-the-middle attacks.
Credits
Splunk would like to thank ‘The Upside Travel Company’ for reporting this issue.
CVSS Severity (version 3.0):
CVSS Base Score 7.4 CVSS Impact Subscore 5.2 CVSS Exploitability Subscore 2.2 Overall CVSS Score 7.4
Document History
- 2019-Jan-14: Rev 1. Initial Release