Lucene search

K

31 matches found

CVE
CVE
added 2022/05/06 5:15 p.m.1437 views

CVE-2021-33845

The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.

5.3CVSS5.2AI score0.00292EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.111 views

CVE-2022-26889

In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack...

8.8CVSS8.7AI score0.00073EPSS
CVE
CVE
added 2022/08/16 9:15 p.m.102 views

CVE-2022-37439

In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash and would require manually removing the malformed...

5.5CVSS5.4AI score0.00058EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.101 views

CVE-2021-26253

A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or s...

8.1CVSS8.1AI score0.00204EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.99 views

CVE-2022-32158

Splunk Enterprise deployment servers in versions before 8.1.10.1, 8.2.6.1, and 9.0 let clients deploy forwarder bundles to other deployment clients through the deployment server. An attacker that compromised a Universal Forwarder endpoint could use the vulnerability to execute arbitrary code on all...

10CVSS9.5AI score0.00957EPSS
CVE
CVE
added 2022/03/25 7:15 p.m.95 views

CVE-2021-3422

The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions ...

7.5CVSS7.5AI score0.00396EPSS
CVE
CVE
added 2022/11/03 11:15 p.m.92 views

CVE-2022-43571

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.

8.8CVSS8.9AI score0.26351EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.87 views

CVE-2021-31559

A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders.

7.5CVSS7.7AI score0.00145EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.85 views

CVE-2022-27183

The Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions before 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on Splunk Cloud Platform...

8.8CVSS6.7AI score0.00578EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.81 views

CVE-2022-32156

In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI http...

8.1CVSS8.2AI score0.00185EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.75 views

CVE-2022-26070

When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path. The vulnerability impacts Splunk Enterprise versions before 8.1.0.

4.3CVSS4.5AI score0.00263EPSS
CVE
CVE
added 2022/05/06 5:15 p.m.73 views

CVE-2021-42743

A misconfiguration in the node default path allows for local privilege escalation from a lower privileged user to the Splunk user in Splunk Enterprise versions before 8.1.1 on Windows.

8.8CVSS7.9AI score0.0012EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.71 views

CVE-2022-32151

The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries ...

9.1CVSS8.5AI score0.00277EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.71 views

CVE-2022-32157

Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9...

7.5CVSS7.7AI score0.00503EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.71 views

CVE-2022-43572

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.

7.5CVSS6.5AI score0.00364EPSS
CVE
CVE
added 2022/08/16 9:15 p.m.70 views

CVE-2022-37437

When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Des...

9.8CVSS8.5AI score0.00156EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.67 views

CVE-2022-43567

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.

8.8CVSS8.8AI score0.00622EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.66 views

CVE-2022-43568

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.

8.8CVSS6.8AI score0.30975EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.64 views

CVE-2022-32155

In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the uni...

7.5CVSS7.4AI score0.00432EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.63 views

CVE-2022-43562

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.

5.4CVSS4.3AI score0.0012EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.58 views

CVE-2022-43570

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.

8.8CVSS7.1AI score0.00167EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.57 views

CVE-2022-32154

Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and poten...

8.1CVSS7.3AI score0.00248EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.57 views

CVE-2022-43565

In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the ‘tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the...

8.8CVSS8.6AI score0.00055EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.56 views

CVE-2022-32152

Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. Ho...

8.1CVSS7.3AI score0.00496EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.56 views

CVE-2022-43566

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspac...

8CVSS7.4AI score0.00053EPSS
CVE
CVE
added 2022/11/03 11:15 p.m.53 views

CVE-2022-43561

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled.

6.4CVSS5.3AI score0.00078EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.52 views

CVE-2022-43563

In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish ...

8.8CVSS8.6AI score0.00055EPSS
CVE
CVE
added 2022/06/15 5:15 p.m.51 views

CVE-2022-32153

Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. Ho...

8.1CVSS8.1AI score0.00405EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.50 views

CVE-2022-43564

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.

6.5CVSS5.7AI score0.00255EPSS
CVE
CVE
added 2022/08/16 9:15 p.m.49 views

CVE-2022-37438

In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drilldown component. The vulnerability requires user a...

3.5CVSS3.6AI score0.00317EPSS
CVE
CVE
added 2022/11/04 11:15 p.m.49 views

CVE-2022-43569

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.

8CVSS5.8AI score0.00503EPSS