FKIE_CVE-2011-4644

Vulnerability from fkie_nvd - Published: 2012-01-03 11:55 - Updated: 2026-04-29 01:13
Severity ?
Summary
Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.
Impacted products
Vendor Product Version
splunk splunk *
splunk splunk 2.1
splunk splunk 2.2
splunk splunk 2.2.1
splunk splunk 2.2.3
splunk splunk 2.2.6
splunk splunk 3.0
splunk splunk 3.0.1
splunk splunk 3.0.2
splunk splunk 3.1
splunk splunk 3.1.1
splunk splunk 3.1.2
splunk splunk 3.1.3
splunk splunk 3.1.4
splunk splunk 3.2
splunk splunk 3.2.1
splunk splunk 3.2.2
splunk splunk 3.2.3
splunk splunk 3.2.4
splunk splunk 3.2.5
splunk splunk 3.2.6
splunk splunk 3.3
splunk splunk 3.3.1
splunk splunk 3.3.2
splunk splunk 3.3.3
splunk splunk 3.3.4
splunk splunk 3.4
splunk splunk 3.4.1
splunk splunk 3.4.2
splunk splunk 3.4.3
splunk splunk 3.4.5
splunk splunk 3.4.6
splunk splunk 3.4.8
splunk splunk 3.4.9
splunk splunk 3.4.10
splunk splunk 3.4.11
splunk splunk 3.4.12
splunk splunk 3.4.13
splunk splunk 3.4.14
splunk splunk 4.0
splunk splunk 4.0.1
splunk splunk 4.0.2
splunk splunk 4.0.3
splunk splunk 4.0.4
splunk splunk 4.0.5
splunk splunk 4.0.6
splunk splunk 4.0.7
splunk splunk 4.0.8
splunk splunk 4.0.9
splunk splunk 4.0.10
splunk splunk 4.0.11
splunk splunk 4.1
splunk splunk 4.1.1
splunk splunk 4.1.2
splunk splunk 4.1.3
splunk splunk 4.1.4
splunk splunk 4.1.5
splunk splunk 4.1.6
splunk splunk 4.1.7
splunk splunk 4.1.8
splunk splunk 4.2
splunk splunk 4.2.1
splunk splunk 4.2.2
splunk splunk 4.2.3
splunk splunk 4.2.4

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD38C847-6E9E-4824-8810-D9EB67A12C37",
              "versionEndIncluding": "4.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "021D17D5-0586-479D-83C6-B2052C2E7A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6ABF7F-D546-4209-8436-E12269416051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2A3889-653A-43FC-8DF5-DD0739761FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D784472-E3E2-4237-8478-35919E0441E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7EBCA0-DB27-4461-8DB4-4982CEF6A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72C0079-D8F9-43D9-B901-66FBD2763728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B125D64A-773B-475A-AAC9-82B459A1502F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "683FA4D9-BB9C-4369-AE01-F466B79E20F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "636524AA-53A0-4E02-B38A-2771E3C49C09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A280EC45-A2CE-4E7C-8267-36C304C6A14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB65F8D-B7F7-4C34-A9E6-90BAC14B93F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "39728F28-A8E7-4A3B-ACFA-F97CD51E03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C9B48A-72EC-42CB-9C4E-A25CE64ADE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09F035-CECE-4F1D-B77D-D5F267A7FDE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD740D5-2C0A-47BA-9B03-E1862508C669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0341FDEA-5134-4472-BF4B-0FE95C461F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304FF51-EE05-490A-B919-CCFD2E7977FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA8110C3-805C-4552-BAB1-0993D399293F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2522C6-710E-48D6-B5B0-FFEB1D79DC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "61812C19-2E7F-4630-BF2A-96ACFE3BABB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4904B-57A8-4BE5-B4D9-B529AA44F860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A70F7A-9893-450E-B0CF-7E46D21C9ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "53070C99-9A5A-4913-AE1F-6053294E3885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "573F58AA-D2F4-4691-9FB3-B88AF0DDF3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA3C10-5A70-49A1-B6D2-3D585009AC46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F146AAF2-E3C6-4245-B7CE-394B0FE5ED5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C878B618-5B57-45D5-922B-F8BFEEA6DFA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "191EA6C2-5774-45A2-8B3D-7889F85F30CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AEFF4F-8FBC-446B-BDB5-303EE9BBCADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8291844F-8199-44C1-A8AA-42F715902C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A81C601-A39A-4963-AFBC-1E7B7A12E132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4866887F-1BC5-4AAD-ADE1-1C8BBF8846EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17902DB-9EF7-4F83-9AD7-08DCE5A6269C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4754E5-793C-48DE-952B-D0FB160E28E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F454E4A-1A08-471D-9A62-84A049DF6D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D662DA49-4569-4079-BDFE-361B0D78D7A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4260AF02-F859-45A7-B95D-EE41B508DEEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "35ACFA65-79E5-493A-A1B7-B0E4B953EFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCFC155-E9C9-4AE3-9CB8-D2244B9E0269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "368E31F0-E8F2-459E-B78E-EEC3AB544669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDCB0EF9-08B5-4B91-876D-2C7CF7880AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1709D44B-DC91-4BCC-982F-7BE361A09FF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62042A83-23C7-478A-BE5C-8C66B6FB59C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB5CDED-459E-4AF9-8747-1F58FA1950E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0705659E-3230-4C28-BA56-F1F2E8BEB83A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD076DE-EBF4-4829-847A-8B20DD614414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B16311C2-2BB3-42E3-BFF8-860467C10611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F6F485-280B-408C-A381-76807862785D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "551D7F83-61DD-4333-86ED-B1D38659B76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BD38F5-B7C6-4CE9-A1B0-1E201CD0979E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B16A56F-EACF-47AC-B541-2D865CC31705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B57A4-D586-444B-BD14-311AEBC40C00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "335BA0E8-428B-4163-A809-90BEE79A7395",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE5B6A8-FB1E-4C0A-AC53-C0ABABE595C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE95A88B-F94B-4B3C-B0FC-0202E9E70FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "01CE667B-19F8-4ACE-BCF1-5CC0C1862720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "74576145-857B-4A73-A9DE-B8CD6D45BB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5323DA2-5E22-428C-98E9-EA3E9927C1E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EE64CA-F199-4594-A8FA-CF5138492BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "987B0894-735C-4E68-876B-C3041F36D4DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ABEF8-D38E-49CF-A91B-F007DA4FBAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8AC9B9-3A83-4899-85BC-798BEFE90AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD250E15-098A-4AF6-89E2-E25A98E55EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9FD9D3-6E15-45A4-B066-2BA17F4D6512",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request."
    },
    {
      "lang": "es",
      "value": "Splunk versi\u00f3n 4.2.5 y anteriores, cuando se selecciona una licencia Gratuita, habilita funciones potencialmente indeseables en un entorno que intencionalmente no admite la autenticaci\u00f3n, lo que permite a los atacantes remotos (1) leer archivos arbitrarios por medio de una sesi\u00f3n de la consola de administraci\u00f3n que aprovecha la capacidad de crear fuentes de datos dise\u00f1ados, o (2) ejecutar comandos de administraci\u00f3n por medio de una petici\u00f3n HTTP."
    }
  ],
  "id": "CVE-2011-4644",
  "lastModified": "2026-04-29T01:13:23.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-03T11:55:04.047",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18245/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/?p=233"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18245/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/?p=233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…