Lucene search

K
nvd[email protected]NVD:CVE-2023-32709
HistoryJun 01, 2023 - 5:15 p.m.

CVE-2023-32709

2023-06-0117:15:10
CWE-285
web.nvd.nist.gov
4
splunk
security
vulnerability
versions
9.0.5
8.2.11
8.1.14
low-privileged user
user role
hashed version
initial user name
password
rest spl command
conf-user-seed
rest endpoint

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.9

Confidence

High

EPSS

0.001

Percentile

29.6%

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint.

Affected configurations

Nvd
Node
splunksplunkRange8.1.08.1.14enterprise
OR
splunksplunkRange8.2.08.2.11enterprise
OR
splunksplunkRange9.0.09.0.5enterprise
OR
splunksplunk_cloud_platformRange<9.0.2303.100
VendorProductVersionCPE
splunksplunk*cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
splunksplunk_cloud_platform*cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.9

Confidence

High

EPSS

0.001

Percentile

29.6%

Related for NVD:CVE-2023-32709