All the vulnerabilites related to Splunk - Splunk Enterprise
cve-2023-22942
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery in the ‘ssg/kvstore_client’ REST Endpoint in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0212" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/4742d5f7-ce00-45ce-9c79-5e98b43b4410/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the \u2018kvstore_client\u2019 REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the \u2018kvstore_client\u2019 REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:21.064Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0212" }, { "url": "https://research.splunk.com/application/4742d5f7-ce00-45ce-9c79-5e98b43b4410/" } ], "source": { "advisory": "SVD-2023-0212" }, "title": "Cross-Site Request Forgery in the \u2018ssg/kvstore_client\u2019 REST Endpoint in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22942", "datePublished": "2023-02-14T17:22:39.330Z", "dateReserved": "2023-01-10T21:39:55.584Z", "dateUpdated": "2024-10-30T15:06:21.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36994
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Persistent Cross-site Scripting (XSS) in Dashboard Elements
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36994", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-01T18:38:06.384849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-01T21:02:28.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0714" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/b0a67520-ae82-4cf6-b04e-9f6cce56830d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View and Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View and Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:58.760Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0714" }, { "url": "https://research.splunk.com/application/b0a67520-ae82-4cf6-b04e-9f6cce56830d" } ], "source": { "advisory": "SVD-2024-0714" }, "title": "Persistent Cross-site Scripting (XSS) in Dashboard Elements" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36994", "datePublished": "2024-07-01T16:30:40.653Z", "dateReserved": "2024-05-30T16:36:21.002Z", "dateUpdated": "2024-10-30T15:05:58.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23676
Vulnerability from cvelistv5
Published
2024-01-22 20:37
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Sensitive Information Disclosure of Index Metrics through “mrollup” SPL Command
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0106" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.8", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.3", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2308.200", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-01-22T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk versions below 9.0.8 and 9.1.3, the \u201cmrollup\u201d SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit." } ], "value": "In Splunk versions below 9.0.8 and 9.1.3, the \u201cmrollup\u201d SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:50.596Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0106" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "source": { "advisory": "SVD-2024-0106" }, "title": "Sensitive Information Disclosure of Index Metrics through \u201cmrollup\u201d SPL Command" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-23676", "datePublished": "2024-01-22T20:37:42.546Z", "dateReserved": "2024-01-19T16:28:17.341Z", "dateUpdated": "2024-10-30T15:06:50.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23677
Vulnerability from cvelistv5
Published
2024-01-22 20:37
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Server Response Disclosure in RapidDiag Salesforce.com Log File
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0107" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.8", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2208", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Vikram Ashtaputre, Splunk" } ], "datePublic": "2024-01-22T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file." } ], "value": "In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:44.509Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0107" } ], "source": { "advisory": "SVD-2024-0107" }, "title": "Server Response Disclosure in RapidDiag Salesforce.com Log File" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-23677", "datePublished": "2024-01-22T20:37:41.993Z", "dateReserved": "2024-01-19T16:28:17.341Z", "dateUpdated": "2024-10-30T15:06:44.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22940
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
SPL Command Safeguards Bypass via the ‘collect’ SPL Command Aliases in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.404Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0210" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2212", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "James Ervin, Splunk" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the \u2018collect\u2019 search processing language (SPL) command, including \u2018summaryindex\u2019, \u2018sumindex\u2019, \u2018stash\u2019,\u2019 mcollect\u2019, and \u2018meventcollect\u2019, were not designated as safeguarded commands. The commands could potentially allow for the exposing of data to a summary index that unprivileged users could access. The vulnerability requires a higher privileged user to initiate a request within their browser, and only affects instances with Splunk Web enabled." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the \u2018collect\u2019 search processing language (SPL) command, including \u2018summaryindex\u2019, \u2018sumindex\u2019, \u2018stash\u2019,\u2019 mcollect\u2019, and \u2018meventcollect\u2019, were not designated as safeguarded commands. The commands could potentially allow for the exposing of data to a summary index that unprivileged users could access. The vulnerability requires a higher privileged user to initiate a request within their browser, and only affects instances with Splunk Web enabled." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:52.622Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0210" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "source": { "advisory": "SVD-2023-0210" }, "title": "SPL Command Safeguards Bypass via the \u2018collect\u2019 SPL Command Aliases in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22940", "datePublished": "2023-02-14T17:22:34.688Z", "dateReserved": "2023-01-10T21:39:55.584Z", "dateUpdated": "2024-10-30T15:05:52.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36992
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-site Scripting (XSS) in Dashboard Elements
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36992", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-01T20:51:04.772976Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-01T20:51:12.604Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0712" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of unauthorized JavaScript code in the browser of a user. The \u201curl\u201d parameter of the Dashboard element does not have proper input validation to reject invalid URLs, which could lead to a Persistent Cross-site Scripting (XSS) exploit." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of unauthorized JavaScript code in the browser of a user. The \u201curl\u201d parameter of the Dashboard element does not have proper input validation to reject invalid URLs, which could lead to a Persistent Cross-site Scripting (XSS) exploit." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:23.514Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0712" } ], "source": { "advisory": "SVD-2024-0712" }, "title": "Persistent Cross-site Scripting (XSS) in Dashboard Elements" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36992", "datePublished": "2024-07-01T16:30:51.507Z", "dateReserved": "2024-05-30T16:36:21.001Z", "dateUpdated": "2024-10-30T15:06:23.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45740
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45740", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:37:44.276401Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:37:53.294Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2403.100", "status": "affected", "version": "9.2.2403", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user." } ], "value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:51.420Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1010" }, { "url": "https://research.splunk.com/application/d4f55f7c-6518-4122-a197-951fe0f21b25/" } ], "source": { "advisory": "SVD-2024-1010" }, "title": "Persistent Cross-Site Scripting (XSS) through Scheduled Views on Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45740", "datePublished": "2024-10-14T17:03:29.360Z", "dateReserved": "2024-09-05T21:35:21.291Z", "dateUpdated": "2024-10-30T15:05:51.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45741
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2403.108", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.205", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45741", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:29:56.360207Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:31:19.677Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2403.108", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.205", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a malicious payload through a custom configuration file that the \"api.uri\" parameter from the \"/manager/search/apps/local\" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user." } ], "value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could create a malicious payload through a custom configuration file that the \"api.uri\" parameter from the \"/manager/search/apps/local\" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:08.924Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1011" }, { "url": "https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/" } ], "source": { "advisory": "SVD-2024-1011" }, "title": "Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45741", "datePublished": "2024-10-14T17:03:33.986Z", "dateReserved": "2024-09-05T21:35:21.291Z", "dateUpdated": "2024-10-30T15:06:08.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26070
Vulnerability from cvelistv5
Published
2022-05-06 16:37
Modified
2024-08-03 04:56
Severity ?
EPSS score ?
Summary
Error message discloses internal path
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "Version(s) before 8.1.0" } ] } ], "credits": [ { "lang": "en", "value": "Dipak Prajapati (Lethal)" } ], "descriptions": [ { "lang": "en", "value": "When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path. The vulnerability impacts Splunk Enterprise versions before 8.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-06T16:37:16", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html" } ], "source": { "advisory": "SVD-2022-0507", "discovery": "EXTERNAL" }, "title": "Error message discloses internal path", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2022-26070", "STATE": "PUBLIC", "TITLE": "Error message discloses internal path" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "Version(s) before 8.1.0" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Dipak Prajapati (Lethal)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path. The vulnerability impacts Splunk Enterprise versions before 8.1.0." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html" } ] }, "source": { "advisory": "SVD-2022-0507", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-26070", "datePublished": "2022-05-06T16:37:16", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T04:56:37.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43565
Vulnerability from cvelistv5
Published
2022-11-04 22:20
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Risky command safeguards bypass via ‘tstats command JSON in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the \u2018tstats command handles Javascript Object Notation (JSON) lets an attacker bypass \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards\"\u003eSPL safeguards for risky commands\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. \u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the \u2018tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. \n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:20:55.783Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html" } ], "source": { "advisory": "SVD-2022-1105", "discovery": "INTERNAL" }, "title": "Risky command safeguards bypass via \u2018tstats command JSON in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43565", "datePublished": "2022-11-04T22:20:55.783Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2024-08-03T13:32:59.756Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36991
Vulnerability from cvelistv5
Published
2024-07-01 16:31
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on Windows
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:9.0.0:*:*:*:enterprise:*:*:*" ], "defaultStatus": "affected", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.0.10", "status": "affected", "version": "9.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk:9.1.0:*:*:*:enterprise:*:*:*" ], "defaultStatus": "affected", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.1.5", "status": "affected", "version": "9.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk:9.2:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36991", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-01T20:11:28.292396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:33:58.869Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0711" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/e7c2b064-524e-4d65-8002-efce808567aa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows." } ], "value": "In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize \u0027.../...//\u0027 (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:48.989Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0711" }, { "url": "https://research.splunk.com/application/e7c2b064-524e-4d65-8002-efce808567aa" } ], "source": { "advisory": "SVD-2024-0711" }, "title": "Path Traversal on the \u201c/modules/messaging/\u201c endpoint in Splunk Enterprise on Windows" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36991", "datePublished": "2024-07-01T16:31:03.563Z", "dateReserved": "2024-05-30T16:36:21.001Z", "dateUpdated": "2024-10-30T15:05:48.989Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26253
Vulnerability from cvelistv5
Published
2022-05-06 16:34
Modified
2024-08-03 20:19
Severity ?
EPSS score ?
Summary
Bypass of Splunk Enterprise's implementation of DUO MFA
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.123Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "Version(s) before 8.1.6" } ] } ], "credits": [ { "lang": "en", "value": "Sanket Bhimani" } ], "descriptions": [ { "lang": "en", "value": "A potential vulnerability in Splunk Enterprise\u0027s implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-06T16:34:33", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html" } ], "source": { "advisory": "SVD-2022-0504", "discovery": "EXTERNAL" }, "title": "Bypass of Splunk Enterprise\u0027s implementation of DUO MFA", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2021-26253", "STATE": "PUBLIC", "TITLE": "Bypass of Splunk Enterprise\u0027s implementation of DUO MFA" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "Version(s) before 8.1.6" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Sanket Bhimani" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential vulnerability in Splunk Enterprise\u0027s implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html" } ] }, "source": { "advisory": "SVD-2022-0504", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2021-26253", "datePublished": "2022-05-06T16:34:33", "dateReserved": "2021-11-03T00:00:00", "dateUpdated": "2024-08-03T20:19:20.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45736
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2403.107", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.204", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2312.111", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45736", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T16:36:03.459233Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T16:40:23.384Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2403.107", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.204", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2312.111", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo\u00a0Dmytriiev (DDV_UA)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a search query with an improperly formatted \"INGEST_EVAL\" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd)." } ], "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a search query with an improperly formatted \"INGEST_EVAL\" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd)." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:13.696Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1006" }, { "url": "https://research.splunk.com/application/08978eca-caff-44c1-84dc-53f17def4e14/" } ], "source": { "advisory": "SVD-2024-1006" }, "title": "Improperly Formatted \u2018INGEST_EVAL\u2019 Parameter Crashes Splunk Daemon" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45736", "datePublished": "2024-10-14T17:03:34.828Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:06:13.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43567
Vulnerability from cvelistv5
Published
2022-11-04 22:21
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Remote Code Execution via the Splunk Secure Gateway application Mobile Alerts feature
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/baa41f09-df48-4375-8991-520beea161be/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:21:50.819Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html" }, { "url": "https://research.splunk.com/application/baa41f09-df48-4375-8991-520beea161be/" } ], "source": { "advisory": "SVD-2022-1107", "discovery": "EXTERNAL" }, "title": "Remote Code Execution via the Splunk Secure Gateway application Mobile Alerts feature" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43567", "datePublished": "2022-11-04T22:21:50.819Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2024-08-03T13:32:59.758Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46214
Vulnerability from cvelistv5
Published
2023-11-16 20:15
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Remote code execution (RCE) in Splunk Enterprise through Insecure XML Parsing
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:40.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-1104" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299/" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.7", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46214", "options": [ { "Exploitation": "PoC" }, { "Automatable": "No" }, { "Technical Impact": "Total" } ], "role": "CISA Coordinator", "timestamp": "2023-11-21T05:00:57.261536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T20:27:06.685Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.7", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.2", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2308", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alex Hordijk" } ], "datePublic": "2023-11-16T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance." } ], "value": "In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:54.312Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-1104" }, { "url": "https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299/" }, { "url": "https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e/" } ], "source": { "advisory": "SVD-2023-1104" }, "title": "Remote code execution (RCE) in Splunk Enterprise through Insecure XML Parsing" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-46214", "datePublished": "2023-11-16T20:15:25.838Z", "dateReserved": "2023-10-18T17:02:51.236Z", "dateUpdated": "2024-10-30T15:06:54.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43572
Vulnerability from cvelistv5
Published
2022-11-04 22:23
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Indexing blockage via malformed data sent through S2S or HEC protocols in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:23:39.383Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" } ], "source": { "advisory": "SVD-2022-1112", "discovery": "UNKNOWN" }, "title": "Indexing blockage via malformed data sent through S2S or HEC protocols in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43572", "datePublished": "2022-11-04T22:23:39.383Z", "dateReserved": "2022-10-20T18:41:33.321Z", "dateUpdated": "2024-08-03T13:32:59.547Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31559
Vulnerability from cvelistv5
Published
2022-05-06 16:35
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
S2S TcpToken authentication bypass
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "8.2 version(s) before 8.2.1" }, { "status": "affected", "version": "Version(s) before 8.1.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "CWE-288", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-06T16:35:19", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html" } ], "source": { "advisory": "SVD-2022-0503", "discovery": "EXTERNAL" }, "title": "S2S TcpToken authentication bypass", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2021-31559", "STATE": "PUBLIC", "TITLE": "S2S TcpToken authentication bypass" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "8.2 version(s) before 8.2.1" }, { "version_value": "Version(s) before 8.1.5" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-288" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html" } ] }, "source": { "advisory": "SVD-2022-0503", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2021-31559", "datePublished": "2022-05-06T16:35:19", "dateReserved": "2021-11-03T00:00:00", "dateUpdated": "2024-08-03T23:03:33.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46213
Vulnerability from cvelistv5
Published
2023-11-16 20:15
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) on “Show Syntax Highlighted” View in Search Page
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.0.7", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThan": "9.1.2", "status": "affected", "version": "9.1", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2308", "status": "affected", "version": "-", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46213", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-20T19:29:45.410405Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:11.523Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:40.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-1103" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/1030bc63-0b37-4ac9-9ae0-9361c955a3cc/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.7", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.2", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2308", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Joshua Neubecker" } ], "datePublic": "2023-11-16T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.7 and 9.1.2, ineffective escaping in the \u201cShow syntax Highlighted\u201d feature can result in the execution of unauthorized code in a user\u2019s web browser." } ], "value": "In Splunk Enterprise versions below 9.0.7 and 9.1.2, ineffective escaping in the \u201cShow syntax Highlighted\u201d feature can result in the execution of unauthorized code in a user\u2019s web browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:30.588Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-1103" }, { "url": "https://research.splunk.com/application/1030bc63-0b37-4ac9-9ae0-9361c955a3cc/" } ], "source": { "advisory": "SVD-2023-1103" }, "title": "Cross-site Scripting (XSS) on \u201cShow Syntax Highlighted\u201d View in Search Page" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-46213", "datePublished": "2023-11-16T20:15:46.739Z", "dateReserved": "2023-10-18T17:02:51.235Z", "dateUpdated": "2024-10-30T15:05:30.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32717
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Role-based Access Control (RBAC) Bypass on '/services/indexing/preview' REST Endpoint Can Overwrite Search Results
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0612" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/bbe26f95-1655-471d-8abd-3d32fafa86f8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Scott Calvert, Splunk" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job." } ], "value": "On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:29.191Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0612" }, { "url": "https://research.splunk.com/application/bbe26f95-1655-471d-8abd-3d32fafa86f8/" } ], "source": { "advisory": "SVD-2023-0612" }, "title": "Role-based Access Control (RBAC) Bypass on \u0027/services/indexing/preview\u0027 REST Endpoint Can Overwrite Search Results" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32717", "datePublished": "2023-06-01T16:34:28.464Z", "dateReserved": "2023-05-11T20:55:59.872Z", "dateUpdated": "2024-10-30T15:05:29.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32708
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
HTTP Response Splitting via the ‘rest’ SPL Command
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0603" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/e615a0e1-a1b2-4196-9865-8aa646e1708c/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the \u2018rest\u2019 SPL command that lets them potentially access other REST endpoints in the system arbitrarily." } ], "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the \u2018rest\u2019 SPL command that lets them potentially access other REST endpoints in the system arbitrarily." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-113", "description": "The software receives data from an upstream component, but does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:47.722Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0603" }, { "url": "https://research.splunk.com/application/e615a0e1-a1b2-4196-9865-8aa646e1708c/" } ], "source": { "advisory": "SVD-2023-0603" }, "title": "HTTP Response Splitting via the \u2018rest\u2019 SPL Command" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32708", "datePublished": "2023-06-01T16:34:27.126Z", "dateReserved": "2023-05-11T20:55:59.871Z", "dateUpdated": "2024-10-30T15:05:47.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40596
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Splunk Enterprise on Windows Privilege Escalation due to Insecure OPENSSLDIR Build Definition Reference in DLL
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "semver" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-40596", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-20T19:34:18.026500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:19:00.590Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0805" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Will Dormann, Vul Labs" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege escalation on the Windows machine." } ], "value": "In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege escalation on the Windows machine." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:41.608Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0805" } ], "source": { "advisory": "SVD-2023-0805" }, "title": "Splunk Enterprise on Windows Privilege Escalation due to Insecure OPENSSLDIR Build Definition Reference in DLL" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40596", "datePublished": "2023-08-30T16:19:43.630Z", "dateReserved": "2023-08-16T22:07:52.838Z", "dateUpdated": "2024-10-30T15:05:41.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36993
Vulnerability from cvelistv5
Published
2024-07-01 16:54
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-site Scripting (XSS) in Web Bulletin
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36993", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T14:26:09.747401Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T15:44:23.469Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0713" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/fd852b27-1882-4505-9f2c-64dfb96f4fc1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:17.394Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0713" }, { "url": "https://research.splunk.com/application/fd852b27-1882-4505-9f2c-64dfb96f4fc1" } ], "source": { "advisory": "SVD-2024-0713" }, "title": "Persistent Cross-site Scripting (XSS) in Web Bulletin" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36993", "datePublished": "2024-07-01T16:54:35.379Z", "dateReserved": "2024-05-30T16:36:21.002Z", "dateUpdated": "2024-10-30T15:06:17.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22934
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
SPL Command Safeguards Bypass via the ‘pivot’ SPL Command in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "semver" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "semver" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.0.2209.3", "status": "affected", "version": "-", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-22934", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-13T20:46:42.856991Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:36:23.394Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0204" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2209.3", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018pivot\u2019 search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018pivot\u2019 search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:55.119Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0204" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "source": { "advisory": "SVD-2023-0204" }, "title": "SPL Command Safeguards Bypass via the \u2018pivot\u2019 SPL Command in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22934", "datePublished": "2023-02-14T17:22:35.427Z", "dateReserved": "2023-01-10T21:39:55.583Z", "dateUpdated": "2024-10-30T15:05:55.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36990
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) on the datamodel/web REST endpoint
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36990", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T14:22:35.192684Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T15:44:40.147Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0710" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/45766810-dbb2-44d4-b889-b4ba3ee0d1f5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.202", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.209", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.2.2403.100, an authenticated, low-privileged user that does not hold the admin or power Splunk roles could send a specially crafted HTTP POST request to the datamodel/web REST endpoint in Splunk Enterprise, potentially causing a denial of service." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.2.2403.100, an authenticated, low-privileged user that does not hold the admin or power Splunk roles could send a specially crafted HTTP POST request to the datamodel/web REST endpoint in Splunk Enterprise, potentially causing a denial of service." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:05.264Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0710" }, { "url": "https://research.splunk.com/application/45766810-dbb2-44d4-b889-b4ba3ee0d1f5" } ], "source": { "advisory": "SVD-2024-0710" }, "title": "Denial of Service (DoS) on the datamodel/web REST endpoint" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36990", "datePublished": "2024-07-01T16:30:57.995Z", "dateReserved": "2024-05-30T16:36:21.001Z", "dateUpdated": "2024-10-30T15:06:05.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22939
Vulnerability from cvelistv5
Published
2023-02-14 17:24
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
SPL Command Safeguards Bypass via the ‘map’ SPL Command in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0209" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2209.3", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Klevis Luli, Splunk" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018map\u2019 search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018map\u2019 search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:49.391Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0209" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "source": { "advisory": "SVD-2023-0209" }, "title": "SPL Command Safeguards Bypass via the \u2018map\u2019 SPL Command in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22939", "datePublished": "2023-02-14T17:24:47.539Z", "dateReserved": "2023-01-10T21:39:55.584Z", "dateUpdated": "2024-10-30T15:06:49.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22935
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
SPL Command Safeguards Bypass via the ‘display.page.search.patterns.sensitivity’ Search Parameter in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0205" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2209.3", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018display.page.search.patterns.sensitivity\u2019 search parameter lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018display.page.search.patterns.sensitivity\u2019 search parameter lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:00.121Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0205" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "source": { "advisory": "SVD-2023-0205" }, "title": "SPL Command Safeguards Bypass via the \u2018display.page.search.patterns.sensitivity\u2019 Search Parameter in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22935", "datePublished": "2023-02-14T17:22:36.093Z", "dateReserved": "2023-01-10T21:39:55.583Z", "dateUpdated": "2024-10-30T15:06:00.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22941
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-22941", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-20T19:25:24.577246Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:26:49.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0211" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/08978eca-caff-44c1-84dc-53f17def4e14/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2212", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "James Ervin, Splunk" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted \u2018INGEST_EVAL\u2019 parameter in a Field Transformation crashes the Splunk daemon (splunkd)." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted \u2018INGEST_EVAL\u2019 parameter in a Field Transformation crashes the Splunk daemon (splunkd)." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "An exception is thrown from a function, but it is not caught.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:10.131Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0211" }, { "url": "https://research.splunk.com/application/08978eca-caff-44c1-84dc-53f17def4e14/" } ], "source": { "advisory": "SVD-2023-0211" }, "title": "Improperly Formatted \u2018INGEST_EVAL\u2019 Parameter Crashes Splunk Daemon" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22941", "datePublished": "2023-02-14T17:22:37.444Z", "dateReserved": "2023-01-10T21:39:55.584Z", "dateUpdated": "2024-10-30T15:06:10.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27183
Vulnerability from cvelistv5
Published
2022-05-06 16:38
Modified
2024-08-03 05:25
Severity ?
EPSS score ?
Summary
Reflected XSS in a query parameter of the Monitoring Console
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0505.html | x_refsource_MISC | |
https://research.splunk.com/application/splunk_xss_in_monitoring_console/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:25:31.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0505.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_xss_in_monitoring_console/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "Version(s) before 8.1.4" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "descriptions": [ { "lang": "en", "value": "The Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions before 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on Splunk Cloud Platform instances. Note that the Cloud Monitoring Console is not impacted." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-06T16:38:41", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0505.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://research.splunk.com/application/splunk_xss_in_monitoring_console/" } ], "source": { "advisory": "SVD-2022-0505", "discovery": "EXTERNAL" }, "title": "Reflected XSS in a query parameter of the Monitoring Console", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2022-27183", "STATE": "PUBLIC", "TITLE": "Reflected XSS in a query parameter of the Monitoring Console" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "Version(s) before 8.1.4" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Danylo Dmytriiev (DDV_UA)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions before 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on Splunk Cloud Platform instances. Note that the Cloud Monitoring Console is not impacted." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0505.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0505.html" }, { "name": "https://research.splunk.com/application/splunk_xss_in_monitoring_console/", "refsource": "MISC", "url": "https://research.splunk.com/application/splunk_xss_in_monitoring_console/" } ] }, "source": { "advisory": "SVD-2022-0505", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-27183", "datePublished": "2022-05-06T16:38:41", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:25:31.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40593
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) in Splunk Enterprise Using a Malformed SAML Request
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0802" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/8e8a86d5-f323-4567-95be-8e817e2baee6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2205", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Aaron Devaney (Dodekeract)" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon." } ], "value": "In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:39.574Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0802" }, { "url": "https://research.splunk.com/application/8e8a86d5-f323-4567-95be-8e817e2baee6/" } ], "source": { "advisory": "SVD-2023-0802" }, "title": "Denial of Service (DoS) in Splunk Enterprise Using a Malformed SAML Request" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40593", "datePublished": "2023-08-30T16:19:41.308Z", "dateReserved": "2023-08-16T22:07:52.838Z", "dateUpdated": "2024-10-30T15:06:39.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23675
Vulnerability from cvelistv5
Published
2024-01-22 20:37
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Splunk App Key Value Store (KV Store) Improper Handling of Permissions Leads to KV Store Collection Deletion
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0105" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-23675", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-23T18:20:30.290043Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T10:41:48.690Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.8", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.3", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Julian Kaufmann" } ], "datePublic": "2024-01-22T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections." } ], "value": "In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:33.153Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0105" }, { "url": "https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/" } ], "source": { "advisory": "SVD-2024-0105" }, "title": "Splunk App Key Value Store (KV Store) Improper Handling of Permissions Leads to KV Store Collection Deletion" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-23675", "datePublished": "2024-01-22T20:37:23.117Z", "dateReserved": "2024-01-19T16:28:17.340Z", "dateUpdated": "2024-10-30T15:05:33.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43571
Vulnerability from cvelistv5
Published
2022-11-03 22:56
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Remote Code Execution through dashboard PDF generation component in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/b06b41d7-9570-4985-8137-0784f582a1b3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-03T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.\u003c/p\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (Code Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T22:56:44.862Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" }, { "url": "https://research.splunk.com/application/b06b41d7-9570-4985-8137-0784f582a1b3/" } ], "source": { "advisory": "SVD-2022-1111", "discovery": "EXTERNAL" }, "title": "Remote Code Execution through dashboard PDF generation component in Splunk Enterprise", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43571", "datePublished": "2022-11-03T22:56:44.862Z", "dateReserved": "2022-10-20T18:37:09.183Z", "dateUpdated": "2024-08-03T13:32:59.741Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43561
Vulnerability from cvelistv5
Published
2022-11-03 22:06
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting in “Save Table” Dialog in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/a974d1ee-ddca-4837-b6ad-d55a8a239c20/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mr Hack (try_to_hack)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the \u201cpower\u201d Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled." } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the \u201cpower\u201d Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T22:06:41.735Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html" }, { "url": "https://research.splunk.com/application/a974d1ee-ddca-4837-b6ad-d55a8a239c20/" } ], "source": { "advisory": "SVD-2022-1101", "discovery": "EXTERNAL" }, "title": "Persistent Cross-Site Scripting in \u201cSave Table\u201d Dialog in Splunk Enterprise", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIf users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/8.2.5/Security/DisableunnecessarySplunkcomponents\"\u003eSee Disable unnecessary Splunk Enterprise components\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;and the \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/latest/Admin/Webconf\"\u003eweb.conf\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;configuration specification file for more information on disabling Splunk Web.\u003c/span\u003e\u003cbr\u003e" } ], "value": "If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. See Disable unnecessary Splunk Enterprise components https://docs.splunk.com/Documentation/Splunk/8.2.5/Security/DisableunnecessarySplunkcomponents and the web.conf https://docs.splunk.com/Documentation/Splunk/latest/Admin/Webconf configuration specification file for more information on disabling Splunk Web.\n" } ] } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43561", "datePublished": "2022-11-03T22:06:41.735Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2024-08-03T13:32:59.806Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37439
Vulnerability from cvelistv5
Published
2022-08-16 19:49
Modified
2024-09-16 22:56
Severity ?
EPSS score ?
Summary
Malformed ZIP file crashes Universal Forwarders and Splunk Enterprise through file monitoring input
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html | x_refsource_CONFIRM | |
https://research.splunk.com/application/b237d393-2f57-4531-aad7-ad3c17c8b041 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Universal Forwarders |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/b237d393-2f57-4531-aad7-ad3c17c8b041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.7.1", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "8.1.11", "status": "affected", "version": "8.1", "versionType": "custom" } ] }, { "product": "Universal Forwarders", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "8.1.11" }, { "lessThan": "8.2.7.1", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "datePublic": "2022-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash and would require manually removing the malformed file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-409", "description": "CWE-409", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T19:49:49", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/b237d393-2f57-4531-aad7-ad3c17c8b041" } ], "source": { "advisory": "SVD-2022-0803", "defect": [ "SPL-220982" ] }, "title": "Malformed ZIP file crashes Universal Forwarders and Splunk Enterprise through file monitoring input", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-08-16T16:00:00.000Z", "ID": "CVE-2022-37439", "STATE": "PUBLIC", "TITLE": "Malformed ZIP file crashes Universal Forwarders and Splunk Enterprise through file monitoring input" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.7.1" }, { "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.11" } ] } }, { "product_name": "Universal Forwarders", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.7.1" }, { "version_name": "8.1", "version_value": "8.1.11" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash and would require manually removing the malformed file." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-409" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html" }, { "name": "https://research.splunk.com/application/b237d393-2f57-4531-aad7-ad3c17c8b041", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/b237d393-2f57-4531-aad7-ad3c17c8b041" } ] }, "source": { "advisory": "SVD-2022-0803", "defect": [ "SPL-220982" ] } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-37439", "datePublished": "2022-08-16T19:49:49.787022Z", "dateReserved": "2022-08-05T00:00:00", "dateUpdated": "2024-09-16T22:56:21.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42743
Vulnerability from cvelistv5
Published
2022-05-06 16:36
Modified
2024-08-04 03:38
Severity ?
EPSS score ?
Summary
Local privilege escalation via a default path in Splunk Enterprise Windows
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:50.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "8.1 version(s) before 8.1.1" } ] } ], "credits": [ { "lang": "en", "value": "Ilias Dimopoulos of\u202fRedyOps Research Labs" } ], "descriptions": [ { "lang": "en", "value": "A misconfiguration in the node default path allows for local privilege escalation from a lower privileged user to the Splunk user in Splunk Enterprise versions before 8.1.1 on Windows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-06T16:36:35", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html" } ], "source": { "advisory": "SVD-2022-0501", "discovery": "EXTERNAL" }, "title": "Local privilege escalation via a default path in Splunk Enterprise Windows", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2021-42743", "STATE": "PUBLIC", "TITLE": "Local privilege escalation via a default path in Splunk Enterprise Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "8.1 version(s) before 8.1.1" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Ilias Dimopoulos of\u202fRedyOps Research Labs" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A misconfiguration in the node default path allows for local privilege escalation from a lower privileged user to the Splunk user in Splunk Enterprise versions before 8.1.1 on Windows." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html" } ] }, "source": { "advisory": "SVD-2022-0501", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2021-42743", "datePublished": "2022-05-06T16:36:35", "dateReserved": "2021-11-03T00:00:00", "dateUpdated": "2024-08-04T03:38:50.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43570
Vulnerability from cvelistv5
Published
2022-11-04 22:22
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
XML External Entity Injection through a custom View in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:22:50.526Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html" } ], "source": { "advisory": "SVD-2022-1110", "discovery": "EXTERNAL" }, "title": "XML External Entity Injection through a custom View in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43570", "datePublished": "2022-11-04T22:22:50.526Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2024-08-03T13:32:59.580Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45734
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45734", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:35:39.991677Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:36:41.279Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard." } ], "value": "In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:56.330Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1004" }, { "url": "https://research.splunk.com/application/7464e2dc-98a5-4af9-87a1-fa6d5a256fa6/" } ], "source": { "advisory": "SVD-2024-1004" }, "title": "Low Privilege User can View Images on the Host Machine by using the PDF Export feature in Splunk Classic Dashboard" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45734", "datePublished": "2024-10-14T17:03:30.412Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:05:56.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33845
Vulnerability from cvelistv5
Published
2022-05-06 16:35
Modified
2024-08-04 00:05
Severity ?
EPSS score ?
Summary
Username enumeration through lockout message in REST API
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html | x_refsource_MISC | |
https://research.splunk.com/application/splunk_user_enumeration_attempt/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:05:51.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_user_enumeration_attempt/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "Version(s) before 8.1.7" } ] } ], "credits": [ { "lang": "en", "value": "Kyle Bambrick" } ], "descriptions": [ { "lang": "en", "value": "The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-06T16:35:58", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://research.splunk.com/application/splunk_user_enumeration_attempt/" } ], "source": { "advisory": "SVD-2022-0502", "discovery": "EXTERNAL" }, "title": "Username enumeration through lockout message in REST API", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2021-33845", "STATE": "PUBLIC", "TITLE": "Username enumeration through lockout message in REST API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "Version(s) before 8.1.7" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Kyle Bambrick" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-203" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html" }, { "name": "https://research.splunk.com/application/splunk_user_enumeration_attempt/", "refsource": "MISC", "url": "https://research.splunk.com/application/splunk_user_enumeration_attempt/" } ] }, "source": { "advisory": "SVD-2022-0502", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2021-33845", "datePublished": "2022-05-06T16:35:58", "dateReserved": "2021-11-03T00:00:00", "dateUpdated": "2024-08-04T00:05:51.041Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22931
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
‘createrss’ External Search Command Overwrites Existing RSS Feeds in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.394Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0201" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.2203", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "James Ervin, Splunk" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13 and 8.2.10, the \u2018createrss\u2019 external search command overwrites existing Resource Description Format Site Summary (RSS) feeds without verifying permissions. This feature has been deprecated and disabled by default." } ], "value": "In Splunk Enterprise versions below 8.1.13 and 8.2.10, the \u2018createrss\u2019 external search command overwrites existing Resource Description Format Site Summary (RSS) feeds without verifying permissions. This feature has been deprecated and disabled by default." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:04.025Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0201" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "source": { "advisory": "SVD-2023-0201" }, "title": "\u2018createrss\u2019 External Search Command Overwrites Existing RSS Feeds in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22931", "datePublished": "2023-02-14T17:22:36.712Z", "dateReserved": "2023-01-10T21:39:55.583Z", "dateUpdated": "2024-10-30T15:06:04.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36986
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Risky command safeguards bypass through Search ID query in Analytics Workspace
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36986", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T20:10:45.837210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T13:53:42.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0706" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:33.489Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0706" }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "source": { "advisory": "SVD-2024-0706" }, "title": "Risky command safeguards bypass through Search ID query in Analytics Workspace" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36986", "datePublished": "2024-07-01T16:30:42.325Z", "dateReserved": "2024-05-30T16:36:21.000Z", "dateUpdated": "2024-10-30T15:06:33.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37437
Vulnerability from cvelistv5
Published
2022-08-16 19:50
Modified
2024-09-16 20:03
Severity ?
EPSS score ?
Summary
Ingest Actions UI in Splunk Enterprise 9.0.0 disabled TLS certificate validation
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.033Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "9.0.0" } ] } ], "credits": [ { "lang": "en", "value": "Eric LaMothe at Splunk" }, { "lang": "en", "value": "Ali Mirheidari at Splunk" } ], "datePublic": "2022-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-16T19:50:29", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html" } ], "source": { "advisory": "SVD-2022-0801", "defect": [ "SPL-224209" ], "discovery": "INTERNAL" }, "title": "Ingest Actions UI in Splunk Enterprise 9.0.0 disabled TLS certificate validation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-08-16T16:00:00.000Z", "ID": "CVE-2022-37437", "STATE": "PUBLIC", "TITLE": "Ingest Actions UI in Splunk Enterprise 9.0.0 disabled TLS certificate validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "=", "version_name": "9.0", "version_value": "9.0.0" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Eric LaMothe at Splunk" }, { "lang": "eng", "value": "Ali Mirheidari at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html" } ] }, "source": { "advisory": "SVD-2022-0801", "defect": [ "SPL-224209" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-37437", "datePublished": "2022-08-16T19:50:29.832023Z", "dateReserved": "2022-08-05T00:00:00", "dateUpdated": "2024-09-16T20:03:48.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36987
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Insecure File Upload in the indexing/preview REST endpoint
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36987", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-01T19:58:40.852474Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-01T21:02:54.620Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0707" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Kyle Bambrick, Splunk" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product\u0027s environment.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:14.971Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0707" } ], "source": { "advisory": "SVD-2024-0707" }, "title": "Insecure File Upload in the indexing/preview REST endpoint" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36987", "datePublished": "2024-07-01T16:30:36.235Z", "dateReserved": "2024-05-30T16:36:21.000Z", "dateUpdated": "2024-10-30T15:06:14.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45739
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Sensitive information disclosure in AdminManager logging channel
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45739", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-14T19:19:09.856336Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T05:38:59.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Eric McGinnis, Splunk" }, { "lang": "en", "value": "Rod Soto, Splunk" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level." } ], "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:45.714Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1009" }, { "url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/" } ], "source": { "advisory": "SVD-2024-1009" }, "title": "Sensitive information disclosure in AdminManager logging channel" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45739", "datePublished": "2024-10-14T17:03:38.949Z", "dateReserved": "2024-09-05T21:35:21.291Z", "dateUpdated": "2024-10-30T15:06:45.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43568
Vulnerability from cvelistv5
Published
2022-11-04 22:22
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Reflected Cross-Site Scripting via the radio template in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:22:13.266Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html" }, { "url": "https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/" } ], "source": { "advisory": "SVD-2022-1108", "discovery": "EXTERNAL" }, "title": "Reflected Cross-Site Scripting via the radio template in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43568", "datePublished": "2022-11-04T22:22:13.266Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2024-08-03T13:32:59.649Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23678
Vulnerability from cvelistv5
Published
2024-01-22 20:37
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Deserialization of Untrusted Data on Splunk Enterprise for Windows through Path Traversal from Separate Disk Partition
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0108" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/947d4d2e-1b64-41fc-b32a-736ddb88ce97/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.8", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.3", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-01-22T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows." } ], "value": "In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:32.228Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0108" }, { "url": "https://research.splunk.com/application/947d4d2e-1b64-41fc-b32a-736ddb88ce97/" } ], "source": { "advisory": "SVD-2024-0108" }, "title": "Deserialization of Untrusted Data on Splunk Enterprise for Windows through Path Traversal from Separate Disk Partition" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-23678", "datePublished": "2024-01-22T20:37:43.095Z", "dateReserved": "2024-01-19T16:28:17.341Z", "dateUpdated": "2024-10-30T15:06:32.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36984
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Remote Code Execution through Serialized Session Payload in Splunk Enterprise on Windows
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:enterprise_security:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:enterprise_security:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:splunk:enterprise_security:9.2:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "enterprise_security", "vendor": "splunk", "versions": [ { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36984", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-10T03:55:19.496959Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:35:47.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0704" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:02.795Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0704" }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "source": { "advisory": "SVD-2024-0704" }, "title": "Remote Code Execution through Serialized Session Payload in Splunk Enterprise on Windows" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36984", "datePublished": "2024-07-01T16:30:44.270Z", "dateReserved": "2024-05-30T16:36:20.999Z", "dateUpdated": "2024-10-30T15:06:02.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22936
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Authenticated Blind Server Side Request Forgery via the ‘search_listener’ Search Parameter in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0206" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2209.3", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018search_listener\u2019 parameter in a search allows for a blind server-side request forgery (SSRF) by an authenticated user. The initiator of the request cannot see the response without the presence of an additional vulnerability within the environment." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018search_listener\u2019 parameter in a search allows for a blind server-side request forgery (SSRF) by an authenticated user. The initiator of the request cannot see the response without the presence of an additional vulnerability within the environment." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:12.523Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0206" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd" } ], "source": { "advisory": "SVD-2023-0206" }, "title": "Authenticated Blind Server Side Request Forgery via the \u2018search_listener\u2019 Search Parameter in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22936", "datePublished": "2023-02-14T17:22:38.050Z", "dateReserved": "2023-01-10T21:39:55.583Z", "dateUpdated": "2024-10-30T15:06:12.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43564
Vulnerability from cvelistv5
Published
2022-11-04 22:20
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Denial of Service in Splunk Enterprise through search macros
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:20:36.543Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html" } ], "source": { "advisory": "SVD-2022-1104", "discovery": "INTERNAL" }, "title": "Denial of Service in Splunk Enterprise through search macros" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43564", "datePublished": "2022-11-04T22:20:36.543Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2024-08-03T13:32:59.627Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-29946
Vulnerability from cvelistv5
Published
2024-03-27 16:15
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Risky command safeguards bypass in Dashboard Examples Hub
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0302" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.2.1", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.4", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.9", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloud", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2312.104", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "9.1.2308.205", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29946", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-30T04:00:57.413620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:38:11.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.1", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.4", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.9", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.104", "status": "affected", "version": "-", "versionType": "custom" }, { "lessThan": "9.1.2308.205", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "datePublic": "2024-03-27T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser." } ], "value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:46.502Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0302" }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "source": { "advisory": "SVD-2024-0302" }, "title": "Risky command safeguards bypass in Dashboard Examples Hub" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-29946", "datePublished": "2024-03-27T16:15:59.872Z", "dateReserved": "2024-03-21T21:09:44.795Z", "dateUpdated": "2024-10-30T15:05:46.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32156
Vulnerability from cvelistv5
Published
2022-06-14 00:00
Modified
2024-08-03 07:32
Severity ?
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS score ?
Summary
Splunk Enterprise and Universal Forwarder CLI connections lacked TLS cert validation
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Universal Forwarder |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:55.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html" }, { "tags": [ "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Universal Forwarder", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSplunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default.\u0026nbsp;\u003c/p\u003e\u003cp\u003eSplunk strongly recommends securing your Splunk environment with hardened TLS configurations. See \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/latest/Security/AboutsecuringyourSplunkconfigurationwithSSL\"\u003eSecuring the Splunk platform with TLS\u003c/a\u003e\u0026nbsp;for more information. However, the vulnerability assumes that you have configured your Splunk platform instances to use transport layer security (TLS) certificates for secure network connections. If you have not and are using the default certificates, the vulnerability is not applicable and is informational.\u003c/p\u003e" } ], "value": "Splunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default. \n\nSplunk strongly recommends securing your Splunk environment with hardened TLS configurations. See Securing the Splunk platform with TLS https://docs.splunk.com/Documentation/Splunk/latest/Security/AboutsecuringyourSplunkconfigurationwithSSL for more information. However, the vulnerability assumes that you have configured your Splunk platform instances to use transport layer security (TLS) certificates for secure network connections. If you have not and are using the default certificates, the vulnerability is not applicable and is informational.\n\n" } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI\"\u003eConfigure TLS host name validation for the Splunk CLI\u003c/a\u003e\u0026nbsp;to enable the remediation.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability does not affect the Splunk Cloud Platform. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThe issue requires conditions beyond the control of a potential bad actor such as a machine-in-the-middle attack. Hence, Splunk rates the complexity of the attack as High.\u0026nbsp;\u003c/p\u003e" } ], "value": "In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI to enable the remediation. The vulnerability does not affect the Splunk Cloud Platform. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.\n\nThe issue requires conditions beyond the control of a potential bad actor such as a machine-in-the-middle attack. Hence, Splunk rates the complexity of the attack as High. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "Universal Forwarders" } ] }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "Splunk Enterprise" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-11T18:56:14.525Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html" }, { "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI" } ], "source": { "advisory": "SVD-2022-0606", "discovery": "INTERNAL" }, "title": "Splunk Enterprise and Universal Forwarder CLI connections lacked TLS cert validation" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32156", "datePublished": "2022-06-14T00:00:00", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T07:32:55.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36997
Vulnerability from cvelistv5
Published
2024-07-01 16:57
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-site Scripting (XSS) in conf-web/settings REST endpoint
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2312.100", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T14:17:17.349360Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:32:06.701Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0717" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.100", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "ST\u00d6K / Fredrik Alexandersson" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:11.331Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0717" }, { "url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c" } ], "source": { "advisory": "SVD-2024-0717" }, "title": "Persistent Cross-site Scripting (XSS) in conf-web/settings REST endpoint" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36997", "datePublished": "2024-07-01T16:57:47.904Z", "dateReserved": "2024-05-30T16:36:21.002Z", "dateUpdated": "2024-10-30T15:06:11.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32707
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
‘edit_user’ Capability Privilege Escalation
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:37.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0602" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/39e1c326-67d7-4c0d-8584-8056354f6593/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Mr Hack (try_to_hack) Santiago Lopez" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the \u2018edit_user\u2019 capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests." } ], "value": "In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the \u2018edit_user\u2019 capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:31.914Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0602" }, { "url": "https://research.splunk.com/application/39e1c326-67d7-4c0d-8584-8056354f6593/" } ], "source": { "advisory": "SVD-2023-0602" }, "title": "\u2018edit_user\u2019 Capability Privilege Escalation" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32707", "datePublished": "2023-06-01T16:34:30.607Z", "dateReserved": "2023-05-11T20:55:59.871Z", "dateUpdated": "2024-10-30T15:05:31.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26889
Vulnerability from cvelistv5
Published
2022-05-06 16:37
Modified
2024-08-03 05:18
Severity ?
EPSS score ?
Summary
Path Traversal in search parameter results in external content injection
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0506.html | x_refsource_MISC | |
https://research.splunk.com/application/path_traversal_spl_injection/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:18:38.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0506.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.splunk.com/application/path_traversal_spl_injection/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "Version(s) before 8.1.2" } ] } ], "credits": [ { "lang": "en", "value": "Jason Tsang Mui Chung" } ], "descriptions": [ { "lang": "en", "value": "In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim\u0027s browser (e.g., phishing)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-31T19:09:32", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0506.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://research.splunk.com/application/path_traversal_spl_injection/" } ], "source": { "advisory": "SVD-2022-0506", "discovery": "EXTERNAL" }, "title": "Path Traversal in search parameter results in external content injection", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2022-26889", "STATE": "PUBLIC", "TITLE": "Path Traversal in search parameter results in external content injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "Version(s) before 8.1.2" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Jason Tsang Mui Chung" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim\u0027s browser (e.g., phishing)." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0506.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0506.html" }, { "name": "https://research.splunk.com/application/path_traversal_spl_injection/", "refsource": "MISC", "url": "https://research.splunk.com/application/path_traversal_spl_injection/" } ] }, "source": { "advisory": "SVD-2022-0506", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-26889", "datePublished": "2022-05-06T16:37:56", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:18:38.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45731
Vulnerability from cvelistv5
Published
2024-10-14 16:46
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45731", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:38:45.988147Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:39:52.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alex Hordijk (hordalex)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive." } ], "value": "In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as .. that can resolve to a location that is outside of that directory.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:06.475Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1001" }, { "url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/" } ], "source": { "advisory": "SVD-2024-1001" }, "title": "Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45731", "datePublished": "2024-10-14T16:46:01.751Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:06:06.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32711
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting (XSS) through a URL Validation Bypass within a Dashboard View
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0605" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/8a43558f-a53c-4ee4-86c1-30b1e8ef3606/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload." } ], "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:55.522Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0605" }, { "url": "https://research.splunk.com/application/8a43558f-a53c-4ee4-86c1-30b1e8ef3606/" } ], "source": { "advisory": "SVD-2023-0605" }, "title": "Persistent Cross-Site Scripting (XSS) through a URL Validation Bypass within a Dashboard View" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32711", "datePublished": "2023-06-01T16:34:27.478Z", "dateReserved": "2023-05-11T20:55:59.872Z", "dateUpdated": "2024-10-30T15:06:55.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32710
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Information Disclosure via the ‘copyresults’ SPL Command
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0609" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the \u2018copyresults\u2019 command if they know the search ID (SID) of a search job that has recently run." } ], "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the \u2018copyresults\u2019 command if they know the search ID (SID) of a search job that has recently run." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:07.709Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0609" } ], "source": { "advisory": "SVD-2023-0609" }, "title": "Information Disclosure via the \u2018copyresults\u2019 SPL Command" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32710", "datePublished": "2023-06-01T16:34:28.796Z", "dateReserved": "2023-05-11T20:55:59.871Z", "dateUpdated": "2024-10-30T15:06:07.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32152
Vulnerability from cvelistv5
Published
2022-06-15 16:46
Modified
2024-09-17 02:02
Severity ?
EPSS score ?
Summary
Splunk Enterprise lacked TLS cert validation for Splunk-to-Splunk communication by default
References
▼ | URL | Tags |
---|---|---|
https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation | x_refsource_CONFIRM | |
https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates | x_refsource_CONFIRM | |
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html | x_refsource_CONFIRM | |
https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/ | x_refsource_CONFIRM | |
https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/ | x_refsource_CONFIRM | |
https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/ | x_refsource_CONFIRM | |
https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/ | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.2203", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:46:29", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" } ], "source": { "advisory": "SVD-2022-0602", "discovery": "INTERNAL" }, "title": "Splunk Enterprise lacked TLS cert validation for Splunk-to-Splunk communication by default", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32152", "STATE": "PUBLIC", "TITLE": "Splunk Enterprise lacked TLS cert validation for Splunk-to-Splunk communication by default" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } }, { "product_name": "Splunk Cloud Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.2203" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Green at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "name": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "name": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "name": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "name": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/", "refsource": "CONFIRM", "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" } ] }, "source": { "advisory": "SVD-2022-0602", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32152", "datePublished": "2022-06-15T16:46:29.133423Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-17T02:02:11.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45733
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45733", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T16:16:11.035193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T16:25:46.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alex Hordijk" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration." } ], "value": "In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:24.728Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1003" }, { "url": "https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/" } ], "source": { "advisory": "SVD-2024-1003" }, "title": "Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45733", "datePublished": "2024-10-14T17:03:36.497Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:06:24.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36995
Vulnerability from cvelistv5
Published
2024-07-01 16:52
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Low-privileged user could create experimental items
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36995", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-01T20:49:54.901075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-01T20:50:04.635Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0715" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/84afda04-0cd6-466b-869e-70d6407d0a34" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "MrHack" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could create experimental items." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could create experimental items." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "The software does not perform an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:53.918Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0715" }, { "url": "https://research.splunk.com/application/84afda04-0cd6-466b-869e-70d6407d0a34" } ], "source": { "advisory": "SVD-2024-0715" }, "title": "Low-privileged user could create experimental items" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36995", "datePublished": "2024-07-01T16:52:57.700Z", "dateReserved": "2024-05-30T16:36:21.002Z", "dateUpdated": "2024-10-30T15:05:53.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22937
Vulnerability from cvelistv5
Published
2023-02-14 17:24
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Unnecessary File Extensions Allowed by Lookup Table Uploads in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0207" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/b7d1293f-e78f-415e-b5f6-443df3480082/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2209.3", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions. Lookup table file extensions may now be one of the following only: .csv, .csv.gz, .kmz, .kml, .mmdb, or .mmdb.gzl." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions. Lookup table file extensions may now be one of the following only: .csv, .csv.gz, .kmz, .kml, .mmdb, or .mmdb.gzl." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:29.732Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0207" }, { "url": "https://research.splunk.com/application/b7d1293f-e78f-415e-b5f6-443df3480082/" } ], "source": { "advisory": "SVD-2023-0207" }, "title": "Unnecessary File Extensions Allowed by Lookup Table Uploads in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22937", "datePublished": "2023-02-14T17:24:45.588Z", "dateReserved": "2023-01-10T21:39:55.584Z", "dateUpdated": "2024-10-30T15:06:29.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43569
Vulnerability from cvelistv5
Published
2022-11-04 22:22
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting via a Data Model object name in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/062bff76-5f9c-496e-a386-cb1adcf69871/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:22:31.895Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html" }, { "url": "https://research.splunk.com/application/062bff76-5f9c-496e-a386-cb1adcf69871/" } ], "source": { "advisory": "SVD-2022-1109", "discovery": "EXTERNAL" }, "title": "Persistent Cross-Site Scripting via a Data Model object name in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43569", "datePublished": "2022-11-04T22:22:31.895Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2024-08-03T13:32:59.647Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40594
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) via the ‘printf’ Search Function
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0803" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40594", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:06:09.286043Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:41:36.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance." } ], "value": "In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:48.199Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0803" }, { "url": "https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/" } ], "source": { "advisory": "SVD-2023-0803" }, "title": "Denial of Service (DoS) via the \u2018printf\u2019 Search Function" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40594", "datePublished": "2023-08-30T16:19:40.677Z", "dateReserved": "2023-08-16T22:07:52.838Z", "dateUpdated": "2024-10-30T15:06:48.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-29945
Vulnerability from cvelistv5
Published
2024-03-27 16:16
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Splunk Authentication Token Exposure in Debug Log in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.0.9", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThan": "9.1.4", "status": "affected", "version": "9.1", "versionType": "semver" }, { "lessThan": "9.2.1", "status": "affected", "version": "9.2", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29945", "options": [ { "Exploitation": "None" }, { "Automatable": "No" }, { "Technical Impact": "Total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-29T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:57:04.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0301" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/9a67e749-d291-40dd-8376-d422e7ecf8b5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.1", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.4", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.9", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alex Napier, Splunk" } ], "datePublic": "2024-03-27T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level." } ], "value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:40.787Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0301" }, { "url": "https://research.splunk.com/application/9a67e749-d291-40dd-8376-d422e7ecf8b5" } ], "source": { "advisory": "SVD-2024-0301" }, "title": "Splunk Authentication Token Exposure in Debug Log in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-29945", "datePublished": "2024-03-27T16:16:00.974Z", "dateReserved": "2024-03-21T21:09:44.795Z", "dateUpdated": "2024-10-30T15:06:40.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32706
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Denial Of Service due to Untrusted XML Tag in XML Parser within SAML Authentication
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0601" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32706", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T20:39:32.865384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:39:54.425Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "9.0.2303 and below", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Vikram Ashtaputre, Splunk" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon." } ], "value": "On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:51.846Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0601" } ], "source": { "advisory": "SVD-2023-0601" }, "title": "Denial Of Service due to Untrusted XML Tag in XML Parser within SAML Authentication" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32706", "datePublished": "2023-06-01T16:34:28.142Z", "dateReserved": "2023-05-11T20:55:59.871Z", "dateUpdated": "2024-10-30T15:06:51.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43562
Vulnerability from cvelistv5
Published
2022-11-04 22:19
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Host Header Injection in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.735Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ali Mirheidari at Splunk" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:19:11.815Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html" } ], "source": { "advisory": "SVD-2022-1102", "discovery": "INTERNAL" }, "title": "Host Header Injection in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43562", "datePublished": "2022-11-04T22:19:11.815Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2024-08-03T13:32:59.735Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40595
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Remote Code Execution via Serialized Session Payload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.989Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0804" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/d1d8fda6-874a-400f-82cf-dcbb59d8e4db/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2305.200", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code." } ], "value": "In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:35.534Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0804" }, { "url": "https://research.splunk.com/application/d1d8fda6-874a-400f-82cf-dcbb59d8e4db/" } ], "source": { "advisory": "SVD-2023-0804" }, "title": "Remote Code Execution via Serialized Session Payload" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40595", "datePublished": "2023-08-30T16:19:29.761Z", "dateReserved": "2023-08-16T22:07:52.838Z", "dateUpdated": "2024-10-30T15:05:35.534Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37438
Vulnerability from cvelistv5
Published
2022-08-16 19:49
Modified
2024-09-17 01:46
Severity ?
EPSS score ?
Summary
Information disclosure via the dashboard drilldown in Splunk Enterprise
References
▼ | URL | Tags |
---|---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html | x_refsource_CONFIRM | |
https://research.splunk.com/application/f844c3f6-fd99-43a2-ba24-93e35fe84be6 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/f844c3f6-fd99-43a2-ba24-93e35fe84be6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.1", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "8.2.7.1", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "8.1.11", "status": "affected", "version": "8.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2205", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Eric LaMothe at Splunk" } ], "datePublic": "2022-08-16T00:00:00", "descriptions": [ { "lang": "en", "value": "In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drilldown component. The vulnerability requires user access to create and share dashboards using Splunk Web." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T20:02:14", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/f844c3f6-fd99-43a2-ba24-93e35fe84be6" } ], "source": { "advisory": "SVD-2022-0802", "defect": [ "SPL-221531" ], "discovery": "INTERNAL" }, "title": "Information disclosure via the dashboard drilldown in Splunk Enterprise", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-08-16T16:00:00.000Z", "ID": "CVE-2022-37438", "STATE": "PUBLIC", "TITLE": "Information disclosure via the dashboard drilldown in Splunk Enterprise" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0.1" }, { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.7.1" }, { "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.11" } ] } }, { "product_name": "Splunk Cloud Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "9.0.2205" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Eric LaMothe at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drilldown component. The vulnerability requires user access to create and share dashboards using Splunk Web." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html" }, { "name": "https://research.splunk.com/application/f844c3f6-fd99-43a2-ba24-93e35fe84be6", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/f844c3f6-fd99-43a2-ba24-93e35fe84be6" } ] }, "source": { "advisory": "SVD-2022-0802", "defect": [ "SPL-221531" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-37438", "datePublished": "2022-08-16T19:49:23.763068Z", "dateReserved": "2022-08-05T00:00:00", "dateUpdated": "2024-09-17T01:46:12.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22932
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting through a Base64-encoded Image in a View in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0202" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ce6e1268-e01c-4df2-a617-0f034ed49a43/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2209.3", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Tim Coen (foobar7)" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise 9.0 versions before 9.0.4, a View allows for Cross-Site Scripting (XSS) through the error message in a Base64-encoded image. The vulnerability affects instances with Splunk Web enabled. It does not affect Splunk Enterprise versions below 9.0." } ], "value": "In Splunk Enterprise 9.0 versions before 9.0.4, a View allows for Cross-Site Scripting (XSS) through the error message in a Base64-encoded image. The vulnerability affects instances with Splunk Web enabled. It does not affect Splunk Enterprise versions below 9.0." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:16.196Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0202" }, { "url": "https://research.splunk.com/application/ce6e1268-e01c-4df2-a617-0f034ed49a43/" } ], "source": { "advisory": "SVD-2023-0202" }, "title": "Persistent Cross-Site Scripting through a Base64-encoded Image in a View in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22932", "datePublished": "2023-02-14T17:22:38.739Z", "dateReserved": "2023-01-10T21:39:55.583Z", "dateUpdated": "2024-10-30T15:06:16.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22938
Vulnerability from cvelistv5
Published
2023-02-14 17:24
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Permissions Validation Failure in the ‘sendemail’ REST API Endpoint in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0208" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2212", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "James Ervin, Splunk" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018sendemail\u2019 REST API endpoint lets any authenticated user send an email as the Splunk instance. The endpoint is now restricted to the \u2018splunk-system-user\u2019 account on the local instance." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018sendemail\u2019 REST API endpoint lets any authenticated user send an email as the Splunk instance. The endpoint is now restricted to the \u2018splunk-system-user\u2019 account on the local instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:42.048Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0208" } ], "source": { "advisory": "SVD-2023-0208" }, "title": "Permissions Validation Failure in the \u2018sendemail\u2019 REST API Endpoint in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22938", "datePublished": "2023-02-14T17:24:46.893Z", "dateReserved": "2023-01-10T21:39:55.584Z", "dateUpdated": "2024-10-30T15:06:42.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40597
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Absolute Path Traversal in Splunk Enterprise Using runshellscript.py
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0806" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2305.200", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk." } ], "value": "In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-36", "description": "The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as /abs/path that can resolve to a location that is outside of that directory.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:34.711Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0806" }, { "url": "https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad/" } ], "source": { "advisory": "SVD-2023-0806" }, "title": "Absolute Path Traversal in Splunk Enterprise Using runshellscript.py" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40597", "datePublished": "2023-08-30T16:19:44.220Z", "dateReserved": "2023-08-16T22:07:52.838Z", "dateUpdated": "2024-10-30T15:06:34.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36989
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Low-privileged user could create notifications in Splunk Web Bulletin Messages
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36989", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T19:54:30.997403Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:54:43.678Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0709" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/4b7f368f-4322-47f8-8363-2c466f0b7030" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, a low-privileged user that does not hold the admin or power Splunk roles could create notifications in Splunk Web Bulletin Messages that all users on the instance receive." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, a low-privileged user that does not hold the admin or power Splunk roles could create notifications in Splunk Web Bulletin Messages that all users on the instance receive." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:43.289Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0709" }, { "url": "https://research.splunk.com/application/4b7f368f-4322-47f8-8363-2c466f0b7030" } ], "source": { "advisory": "SVD-2024-0709" }, "title": "Low-privileged user could create notifications in Splunk Web Bulletin Messages" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36989", "datePublished": "2024-07-01T16:30:38.545Z", "dateReserved": "2024-05-30T16:36:21.001Z", "dateUpdated": "2024-10-30T15:06:43.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36983
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Command Injection using External Lookups
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36983", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T20:10:58.843878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:36:43.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0703" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:19.858Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0703" }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "source": { "advisory": "SVD-2024-0703" }, "title": "Command Injection using External Lookups" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36983", "datePublished": "2024-07-01T16:30:41.779Z", "dateReserved": "2024-05-30T16:36:20.999Z", "dateUpdated": "2024-10-30T15:06:19.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45737
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45737", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T15:44:26.102067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T15:44:34.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2403.108", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.204", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF)." } ], "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF)." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:31.014Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1007" }, { "url": "https://research.splunk.com/application/34bac267-a89b-4bd7-a072-a48eef1f15b8/" } ], "source": { "advisory": "SVD-2024-1007" }, "title": "Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45737", "datePublished": "2024-10-14T17:03:37.328Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:06:31.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45735
Vulnerability from cvelistv5
Published
2024-10-14 16:45
Modified
2024-11-08 22:27
Severity ?
EPSS score ?
Summary
Improper Access Control for low-privileged user in Splunk Secure Gateway App
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Secure Gateway |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_secure_gateway:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_secure_gateway", "vendor": "splunk", "versions": [ { "lessThan": "3.6.17", "status": "affected", "version": "3.6", "versionType": "custom" }, { "lessThan": "3.4.259", "status": "affected", "version": "3.4", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45735", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T19:22:41.212370Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T22:27:41.914Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Secure Gateway", "vendor": "Splunk", "versions": [ { "lessThan": "3.6.17", "status": "affected", "version": "3.6", "versionType": "custom" }, { "lessThan": "3.4.259", "status": "affected", "version": "3.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Gabriel Nitu, Splunk" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App." } ], "value": "In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:01.392Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1005" }, { "url": "https://research.splunk.com/application/0a3d6035-7bef-4dfa-b01e-84349edac3b4/" } ], "source": { "advisory": "SVD-2024-1005" }, "title": "Improper Access Control for low-privileged user in Splunk Secure Gateway App" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45735", "datePublished": "2024-10-14T16:45:54.667Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-11-08T22:27:41.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40592
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Reflected Cross-site Scripting (XSS) on "/app/search/table" web endpoint
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:51.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0801" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/182f9080-4137-4629-94ac-cb1083ac981a/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2305.200", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the \u201c/app/search/table\u201d web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance." } ], "value": "In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the \u201c/app/search/table\u201d web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:44.025Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0801" }, { "url": "https://research.splunk.com/application/182f9080-4137-4629-94ac-cb1083ac981a/" } ], "source": { "advisory": "SVD-2023-0801" }, "title": "Reflected Cross-site Scripting (XSS) on \"/app/search/table\" web endpoint" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40592", "datePublished": "2023-08-30T16:19:38.525Z", "dateReserved": "2023-08-16T22:07:52.837Z", "dateUpdated": "2024-10-30T15:05:44.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32709
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Low-privileged User can View Hashed Default Splunk Password
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:37.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0604" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the \u2018user\u2019 role can see the hashed version of the initial user name and password for the Splunk instance by using the \u2018rest\u2019 SPL command against the \u2018conf-user-seed\u2019 REST endpoint." } ], "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the \u2018user\u2019 role can see the hashed version of the initial user name and password for the Splunk instance by using the \u2018rest\u2019 SPL command against the \u2018conf-user-seed\u2019 REST endpoint." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:35.933Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0604" }, { "url": "https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/" } ], "source": { "advisory": "SVD-2023-0604" }, "title": "Low-privileged User can View Hashed Default Splunk Password" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32709", "datePublished": "2023-06-01T16:34:30.933Z", "dateReserved": "2023-05-11T20:55:59.871Z", "dateUpdated": "2024-10-30T15:06:35.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43563
Vulnerability from cvelistv5
Published
2022-11-04 22:19
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Risky command safeguards bypass via rex search command field names in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards\"\u003eSPL safeguards for risky commands\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:19:55.669Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html" } ], "source": { "advisory": "SVD-2022-1103", "discovery": "INTERNAL" }, "title": "Risky command safeguards bypass via rex search command field names in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43563", "datePublished": "2022-11-04T22:19:55.669Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2024-08-03T13:32:59.588Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36985
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Remote Code Execution (RCE) through an external lookup due to “copybuckets.py“ script in the “splunk_archiver“ application in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36985", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-10T03:55:21.225866Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:35:12.283Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0705" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alex Hordijk" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the \u201csplunk_archiver\u201c application." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the \u201csplunk_archiver\u201c application." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-687", "description": "The software calls a function, procedure, or routine, but the caller specifies an argument that contains the wrong value, which may lead to resultant weaknesses.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:57.544Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0705" }, { "url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131" } ], "source": { "advisory": "SVD-2024-0705" }, "title": "Remote Code Execution (RCE) through an external lookup due to \u201ccopybuckets.py\u201c script in the \u201csplunk_archiver\u201c application in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36985", "datePublished": "2024-07-01T16:30:57.461Z", "dateReserved": "2024-05-30T16:36:20.999Z", "dateUpdated": "2024-10-30T15:05:57.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22933
Vulnerability from cvelistv5
Published
2023-02-14 17:22
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Persistent Cross-Site Scripting through the ‘module’ Tag in a View in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0203" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/9ac2bfea-a234-4a18-9d37-6d747e85c2e4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.10", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.4", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2209", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-02-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a View allows for Cross-Site Scripting (XSS) in an extensible mark-up language (XML) View through the \u2018layoutPanel\u2019 attribute in the \u2018module\u2019 tag\u2019." } ], "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a View allows for Cross-Site Scripting (XSS) in an extensible mark-up language (XML) View through the \u2018layoutPanel\u2019 attribute in the \u2018module\u2019 tag\u2019." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:22.351Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0203" }, { "url": "https://research.splunk.com/application/9ac2bfea-a234-4a18-9d37-6d747e85c2e4" } ], "source": { "advisory": "SVD-2023-0203" }, "title": "Persistent Cross-Site Scripting through the \u2018module\u2019 Tag in a View in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-22933", "datePublished": "2023-02-14T17:22:40.081Z", "dateReserved": "2023-01-10T21:39:55.583Z", "dateUpdated": "2024-10-30T15:06:22.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40598
Vulnerability from cvelistv5
Published
2023-08-30 16:19
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Command Injection in Splunk Enterprise Using External Lookups
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0807" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Cloud", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2305.200", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-08-30T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance." } ], "value": "In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:53.104Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0807" }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/" } ], "source": { "advisory": "SVD-2023-0807" }, "title": "Command Injection in Splunk Enterprise Using External Lookups" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-40598", "datePublished": "2023-08-30T16:19:28.135Z", "dateReserved": "2023-08-16T22:07:52.838Z", "dateUpdated": "2024-10-30T15:06:53.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45732
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2403.103", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "status": "unaffected", "version": "9.1.2312.110" }, { "lessThan": "9.1.2308.208", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45732", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T16:30:27.363227Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T16:34:10.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2403.103", "status": "affected", "version": "9.2.2403", "versionType": "custom" }, { "lessThan": "9.1.2312.110, 9.1.2312.200", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.208", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data." } ], "value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "The software does not perform an authorization check when an actor attempts to access a resource or perform an action.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:18.626Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1002" }, { "url": "https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/" } ], "source": { "advisory": "SVD-2024-1002" }, "title": "Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45732", "datePublished": "2024-10-14T17:03:35.668Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:06:18.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43566
Vulnerability from cvelistv5
Published
2022-11-04 22:21
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
Risky command safeguards bypass via Search ID query in Analytics Workspace in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Anton (therceman)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user\u2019s permissions to bypass \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards\"\u003eSPL safeguards for risky commands\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user\u2019s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards \u00a0in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:21:21.337Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html" }, { "url": "https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/" } ], "source": { "advisory": "SVD-2022-1106", "discovery": "EXTERNAL" }, "title": "Risky command safeguards bypass via Search ID query in Analytics Workspace in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43566", "datePublished": "2022-11-04T22:21:21.337Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2024-08-03T13:32:59.752Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45738
Vulnerability from cvelistv5
Published
2024-10-14 17:03
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Sensitive information disclosure in REST_Calls logging channel
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45738", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-14T19:23:47.032004Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T05:39:00.414Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.1", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.3", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.6", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Eric McGinnis, Splunk" }, { "lang": "en", "value": "Rod Soto, Splunk" } ], "datePublic": "2024-10-14T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level." } ], "value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:37.126Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1008" }, { "url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/" } ], "source": { "advisory": "SVD-2024-1008" }, "title": "Sensitive information disclosure in REST_Calls logging channel" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-45738", "datePublished": "2024-10-14T17:03:38.142Z", "dateReserved": "2024-09-05T21:35:21.290Z", "dateUpdated": "2024-10-30T15:06:37.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32716
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Denial of Service via the 'dump' SPL command
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0611" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/fb0e6823-365f-48ed-b09e-272ac4c1dad6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.14", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.11", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.2303.100", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, an attacker can exploit a vulnerability in the {{dump}} SPL command to cause a denial of service by crashing the Splunk daemon." } ], "value": "In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, an attacker can exploit a vulnerability in the {{dump}} SPL command to cause a denial of service by crashing the Splunk daemon." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "The software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:47.023Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0611" }, { "url": "https://research.splunk.com/application/fb0e6823-365f-48ed-b09e-272ac4c1dad6/" } ], "source": { "advisory": "SVD-2023-0611" }, "title": "Denial of Service via the \u0027dump\u0027 SPL command" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32716", "datePublished": "2023-06-01T16:34:29.168Z", "dateReserved": "2023-05-11T20:55:59.872Z", "dateUpdated": "2024-10-30T15:06:47.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36982
Vulnerability from cvelistv5
Published
2024-07-01 16:31
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Denial of Service through null pointer reference in “cluster/config” REST endpoint
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36982", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T19:30:42.665566Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T19:47:20.337Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0702" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "d0nahu3" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an attacker could trigger a null pointer reference on the cluster/config REST endpoint, which could result in a crash of the Splunk daemon." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an attacker could trigger a null pointer reference on the cluster/config REST endpoint, which could result in a crash of the Splunk daemon." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:25.928Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0702" } ], "source": { "advisory": "SVD-2024-0702" }, "title": "Denial of Service through null pointer reference in \u201ccluster/config\u201d REST endpoint" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36982", "datePublished": "2024-07-01T16:31:04.078Z", "dateReserved": "2024-05-30T16:36:20.999Z", "dateUpdated": "2024-10-30T15:06:25.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32712
Vulnerability from cvelistv5
Published
2023-06-01 16:34
Modified
2024-10-30 15:05
Severity ?
EPSS score ?
Summary
Unauthenticated Log Injection in Splunk Enterprise
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Universal Forwarder |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "8.2.11.2", "status": "affected", "version": "8.2", "versionType": "semver" }, { "lessThan": "9.0.5.1", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThan": "9.1.0.2", "status": "affected", "version": "9.1", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "universal_forwarder", "vendor": "splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "semver" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32712", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-20T19:25:54.346712Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-117", "description": "CWE-117 Improper Output Neutralization for Logs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:26:05.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2023-0606" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/de3908dc-1298-446d-84b9-fa81d37e959b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.11.2", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.5.1", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.0.2", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Universal Forwarder", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.12", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.6", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "9.1.1", "status": "affected", "version": "9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "ST\u00d6K / Fredrik Alexandersson" } ], "datePublic": "2023-06-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code execution in the vulnerable application. This attack requires a user to use a terminal application that supports the translation of ANSI escape codes to read the malicious log file locally in the vulnerable terminal, and to perform additional user interaction to exploit.\nUniversal Forwarder versions 9.1.0.1, 9.0.5, 8.2.11, and lower can be vulnerable in situations where they have management services active and accessible over the network. Universal Forwarder versions 9.0.x and 9.1.x bind management services to the local machine and are not vulnerable in this specific configuration. See SVD-2022-0605 for more information. Universal Forwarder versions 9.1 use Unix Domain Sockets (UDS) for communication, which further reduces the potential attack surface.\nThe vulnerability does not directly affect Splunk Enterprise or Universal Forwarder. The indirect impact on Splunk Enterprise and Universal Forwarder can vary significantly depending on the permissions in the vulnerable terminal application and where and how the user reads the malicious log file. For example, users can copy the malicious file from the Splunk Enterprise instance and read it on their local machine." } ], "value": "In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code execution in the vulnerable application. This attack requires a user to use a terminal application that supports the translation of ANSI escape codes to read the malicious log file locally in the vulnerable terminal, and to perform additional user interaction to exploit.\nUniversal Forwarder versions 9.1.0.1, 9.0.5, 8.2.11, and lower can be vulnerable in situations where they have management services active and accessible over the network. Universal Forwarder versions 9.0.x and 9.1.x bind management services to the local machine and are not vulnerable in this specific configuration. See SVD-2022-0605 for more information. Universal Forwarder versions 9.1 use Unix Domain Sockets (UDS) for communication, which further reduces the potential attack surface.\nThe vulnerability does not directly affect Splunk Enterprise or Universal Forwarder. The indirect impact on Splunk Enterprise and Universal Forwarder can vary significantly depending on the permissions in the vulnerable terminal application and where and how the user reads the malicious log file. For example, users can copy the malicious file from the Splunk Enterprise instance and read it on their local machine." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-117", "description": "The software does not neutralize or incorrectly neutralizes output that is written to logs.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:05:39.173Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2023-0606" }, { "url": "https://research.splunk.com/application/de3908dc-1298-446d-84b9-fa81d37e959b" } ], "source": { "advisory": "SVD-2023-0606" }, "title": "Unauthenticated Log Injection in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2023-32712", "datePublished": "2023-06-01T16:34:29.862Z", "dateReserved": "2023-05-11T20:55:59.872Z", "dateUpdated": "2024-10-30T15:05:39.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36996
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-10-30 15:06
Severity ?
EPSS score ?
Summary
Information Disclosure of user names
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise | |
Splunk | Splunk Cloud Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_enterprise", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36996", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-01T19:26:51.643823Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T21:00:22.102Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0716" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" } ] } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-204", "description": "The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:06:28.559Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0716" } ], "source": { "advisory": "SVD-2024-0716" }, "title": "Information Disclosure of user names" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36996", "datePublished": "2024-07-01T16:30:41.186Z", "dateReserved": "2024-05-30T16:36:21.002Z", "dateUpdated": "2024-10-30T15:06:28.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3422
Vulnerability from cvelistv5
Published
2022-03-25 18:02
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
Indexer denial-of-service via malformed S2S request
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Splunk | Splunk Enterprise |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:17.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0301.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://claroty.com/2022/03/24/blog-research-locking-down-splunk-enterprise-indexers-and-forwarders/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "status": "affected", "version": "8.2 version(s) before 8.2.0" }, { "status": "affected", "version": "8.1 version(s) before 8.1.3" }, { "status": "affected", "version": "8.0 version(s) before 8.0.9" }, { "status": "affected", "version": "7.3 version(s) before 7.3.9" } ] } ], "credits": [ { "lang": "en", "value": "Sharon Brizinov and Tal Keren of Claroty" } ], "descriptions": [ { "lang": "en", "value": "The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions before 8.1.3. It does not impact Universal Forwarders. When Splunk forwarding is secured using TLS or a Token, the attack requires compromising the certificate or token, or both. Implementation of either or both reduces the severity to Medium." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-28T18:52:58", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0301.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://claroty.com/2022/03/24/blog-research-locking-down-splunk-enterprise-indexers-and-forwarders/" } ], "source": { "advisory": "SVD-2022-0301", "discovery": "EXTERNAL" }, "title": "Indexer denial-of-service via malformed S2S request", "x_generator": { "engine": "advisoriator" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "ID": "CVE-2021-3422", "STATE": "PUBLIC", "TITLE": "Indexer denial-of-service via malformed S2S request" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_value": "8.2 version(s) before 8.2.0" }, { "version_value": "8.1 version(s) before 8.1.3" }, { "version_value": "8.0 version(s) before 8.0.9" }, { "version_value": "7.3 version(s) before 7.3.9" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Sharon Brizinov and Tal Keren of Claroty" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions before 8.1.3. It does not impact Universal Forwarders. When Splunk forwarding is secured using TLS or a Token, the attack requires compromising the certificate or token, or both. Implementation of either or both reduces the severity to Medium." } ] }, "generator": { "engine": "advisoriator" }, "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0301.html", "refsource": "MISC", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0301.html" }, { "name": "https://claroty.com/2022/03/24/blog-research-locking-down-splunk-enterprise-indexers-and-forwarders/", "refsource": "MISC", "url": "https://claroty.com/2022/03/24/blog-research-locking-down-splunk-enterprise-indexers-and-forwarders/" } ] }, "source": { "advisory": "SVD-2022-0301", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2021-3422", "datePublished": "2022-03-25T18:02:43", "dateReserved": "2021-03-03T00:00:00", "dateUpdated": "2024-08-03T16:53:17.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }