Lucene search

K
SplunkSplunk

160 matches found

CVE
CVE
added 2014/04/07 10:55 p.m.3935 views

CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys,...

7.5CVSS7.5AI score0.94436EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.1437 views

CVE-2021-33845

The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.

5.3CVSS5.2AI score0.00292EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.231 views

CVE-2023-32707

In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted we...

8.8CVSS8.6AI score0.84516EPSS
CVE
CVE
added 2023/11/16 9:15 p.m.218 views

CVE-2023-46214

In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.

8.8CVSS8.5AI score0.88069EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.180 views

CVE-2023-40598

In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on...

8.8CVSS8.8AI score0.0011EPSS
CVE
CVE
added 2024/01/22 9:15 p.m.176 views

CVE-2024-23675

In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections.

6.5CVSS6.4AI score0.0009EPSS
CVE
CVE
added 2018/06/08 12:29 p.m.175 views

CVE-2018-11409

Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.

5.3CVSS4.9AI score0.92222EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.171 views

CVE-2023-22938

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘sendemail’ REST API endpoint lets any authenticated user send an email as the Splunk instance. The endpoint is now restricted to the ‘splunk-system-user’ account on the local instance.

4.3CVSS4.5AI score0.00145EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.170 views

CVE-2023-32708

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially access other REST endpoints in the system arbitrari...

8.8CVSS7.9AI score0.00151EPSS
CVE
CVE
added 2024/03/27 5:15 p.m.169 views

CVE-2024-29946

In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into init...

8.1CVSS8.1AI score0.0033EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.161 views

CVE-2023-32712

In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code execution in the vul...

8.6CVSS5.3AI score0.00279EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.156 views

CVE-2023-22936

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘search_listener’ parameter in a search allows for a blind server-side request forgery (SSRF) by an authenticated user. The initiator of the request cannot see the response without the presence of an additional vulnerability within ...

6.3CVSS6.3AI score0.00089EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.155 views

CVE-2023-32711

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.

5.4CVSS6.2AI score0.01462EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.155 views

CVE-2023-40592

In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk...

8.4CVSS6.9AI score0.00262EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.151 views

CVE-2023-22941

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted ‘INGEST_EVAL’ parameter in a Field Transformation crashes the Splunk daemon (splunkd).

7.5CVSS6.9AI score0.00583EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.151 views

CVE-2023-22942

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the ‘kvstore_client’ REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request.

5.4CVSS4.7AI score0.00063EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.151 views

CVE-2023-32706

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon.

7.7CVSS6.7AI score0.00215EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.150 views

CVE-2023-22933

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a View allows for Cross-Site Scripting (XSS) in an extensible mark-up language (XML) View through the ‘layoutPanel’ attribute in the ‘module’ tag’.

8CVSS6.1AI score0.00672EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.150 views

CVE-2023-40595

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code.

8.8CVSS8.9AI score0.0056EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.148 views

CVE-2023-32714

In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.

8.1CVSS8AI score0.26818EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.145 views

CVE-2023-22934

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user t...

8CVSS7.5AI score0.00099EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.145 views

CVE-2023-22939

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Sp...

8.8CVSS8.2AI score0.00089EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.145 views

CVE-2023-40597

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.

8.8CVSS8.6AI score0.0007EPSS
CVE
CVE
added 2024/01/22 9:15 p.m.145 views

CVE-2024-23676

In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.

4.6CVSS4.1AI score0.00203EPSS
CVE
CVE
added 2024/01/22 9:15 p.m.145 views

CVE-2024-23677

In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file.

5.3CVSS5.2AI score0.00299EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.144 views

CVE-2023-40596

In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege esca...

8.8CVSS8.1AI score0.00069EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.143 views

CVE-2023-22932

In Splunk Enterprise 9.0 versions before 9.0.4, a View allows for Cross-Site Scripting (XSS) through the error message in a Base64-encoded image. The vulnerability affects instances with Splunk Web enabled. It does not affect Splunk Enterprise versions below 9.0.

8.7CVSS6.4AI score0.00562EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.143 views

CVE-2023-22935

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘display.page.search.patterns.sensitivity’ search parameter lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects inst...

8.8CVSS8.3AI score0.00128EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.142 views

CVE-2023-32710

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the ‘copyresults’ command if they know the search ID (SID) of a search job that has recentl...

5.3CVSS5.2AI score0.00281EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.141 views

CVE-2023-32716

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, an attacker can exploit a vulnerability in the {{dump}} SPL command to cause a denial of service by crashing the Splunk daemon.

6.5CVSS6.4AI score0.00209EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.139 views

CVE-2023-22940

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the ‘collect’ search processing language (SPL) command, including ‘summaryindex’, ‘sumindex’, ‘stash’,’ mcollect’, and ‘meventcollect’, were not designated as safeguarded commands. The commands could potentially allow for the...

6.3CVSS5.8AI score0.00218EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.137 views

CVE-2023-22937

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions. Lookup table file extensions may now be one of the following only: .csv, .csv.gz, .kmz, .kml, .mmdb, or .mmdb.gzl.

4.3CVSS4.7AI score0.00248EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.136 views

CVE-2023-32717

On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

4.3CVSS4.5AI score0.00119EPSS
CVE
CVE
added 2023/02/14 6:15 p.m.133 views

CVE-2023-22931

In Splunk Enterprise versions below 8.1.13 and 8.2.10, the ‘createrss’ external search command overwrites existing Resource Description Format Site Summary (RSS) feeds without verifying permissions. This feature has been deprecated and disabled by default.

4.3CVSS4.8AI score0.0009EPSS
CVE
CVE
added 2023/06/01 5:15 p.m.133 views

CVE-2023-32709

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ...

4.3CVSS4.9AI score0.00164EPSS
CVE
CVE
added 2023/11/16 9:15 p.m.133 views

CVE-2023-46213

In Splunk Enterprise versions below 9.0.7 and 9.1.2, ineffective escaping in the “Show syntax Highlighted” feature can result in the execution of unauthorized code in a user’s web browser.

4.8CVSS5.3AI score0.00167EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.131 views

CVE-2023-40594

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the printf SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.

7.5CVSS6.8AI score0.00149EPSS
CVE
CVE
added 2023/08/30 5:15 p.m.130 views

CVE-2023-40593

In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the /saml/acs REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.

7.5CVSS6.8AI score0.00164EPSS
CVE
CVE
added 2024/01/22 9:15 p.m.127 views

CVE-2024-23678

In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows.

8.8CVSS8.6AI score0.00154EPSS
CVE
CVE
added 2024/07/01 5:15 p.m.123 views

CVE-2024-36991

In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.

7.5CVSS7.4AI score0.89106EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.111 views

CVE-2022-26889

In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack...

8.8CVSS8.7AI score0.00073EPSS
CVE
CVE
added 2024/03/27 5:15 p.m.109 views

CVE-2024-29945

In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at th...

7.2CVSS7.1AI score0.00112EPSS
CVE
CVE
added 2022/08/16 9:15 p.m.102 views

CVE-2022-37439

In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash and would require manually removing the malformed...

5.5CVSS5.4AI score0.00058EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.101 views

CVE-2021-26253

A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or s...

8.1CVSS8.1AI score0.00204EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.99 views

CVE-2022-32158

Splunk Enterprise deployment servers in versions before 8.1.10.1, 8.2.6.1, and 9.0 let clients deploy forwarder bundles to other deployment clients through the deployment server. An attacker that compromised a Universal Forwarder endpoint could use the vulnerability to execute arbitrary code on all...

10CVSS9.5AI score0.00957EPSS
CVE
CVE
added 2022/03/25 7:15 p.m.95 views

CVE-2021-3422

The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions ...

7.5CVSS7.5AI score0.00396EPSS
CVE
CVE
added 2024/12/10 6:15 p.m.94 views

CVE-2024-53246

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such ...

7.5CVSS5.4AI score0.0004EPSS
CVE
CVE
added 2022/11/03 11:15 p.m.92 views

CVE-2022-43571

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.

8.8CVSS8.9AI score0.24408EPSS
CVE
CVE
added 2024/07/01 5:15 p.m.90 views

CVE-2024-36983

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code in...

8.8CVSS8AI score0.00216EPSS
CVE
CVE
added 2014/10/21 3:55 p.m.89 views

CVE-2014-8380

Cross-site scripting (XSS) vulnerability in Splunk 6.1.1 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer Header in a "404 Not Found" response. NOTE: this vulnerability might exist because of a CVE-2010-2429 regression.

4.3CVSS5.6AI score0.03324EPSS
Total number of security vulnerabilities160