CVE Vulnerabilities

CVE-2011-4644

Improper Authentication

Published: Jan 03, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
SplunkSplunk*4.2.5 (including)
SplunkSplunk2.1 (including)2.1 (including)
SplunkSplunk2.2 (including)2.2 (including)
SplunkSplunk2.2.1 (including)2.2.1 (including)
SplunkSplunk2.2.3 (including)2.2.3 (including)
SplunkSplunk2.2.6 (including)2.2.6 (including)
SplunkSplunk3.0 (including)3.0 (including)
SplunkSplunk3.0.1 (including)3.0.1 (including)
SplunkSplunk3.0.2 (including)3.0.2 (including)
SplunkSplunk3.1 (including)3.1 (including)
SplunkSplunk3.1.1 (including)3.1.1 (including)
SplunkSplunk3.1.2 (including)3.1.2 (including)
SplunkSplunk3.1.3 (including)3.1.3 (including)
SplunkSplunk3.1.4 (including)3.1.4 (including)
SplunkSplunk3.2 (including)3.2 (including)
SplunkSplunk3.2.1 (including)3.2.1 (including)
SplunkSplunk3.2.2 (including)3.2.2 (including)
SplunkSplunk3.2.3 (including)3.2.3 (including)
SplunkSplunk3.2.4 (including)3.2.4 (including)
SplunkSplunk3.2.5 (including)3.2.5 (including)
SplunkSplunk3.2.6 (including)3.2.6 (including)
SplunkSplunk3.3 (including)3.3 (including)
SplunkSplunk3.3.1 (including)3.3.1 (including)
SplunkSplunk3.3.2 (including)3.3.2 (including)
SplunkSplunk3.3.3 (including)3.3.3 (including)
SplunkSplunk3.3.4 (including)3.3.4 (including)
SplunkSplunk3.4 (including)3.4 (including)
SplunkSplunk3.4.1 (including)3.4.1 (including)
SplunkSplunk3.4.2 (including)3.4.2 (including)
SplunkSplunk3.4.3 (including)3.4.3 (including)
SplunkSplunk3.4.5 (including)3.4.5 (including)
SplunkSplunk3.4.6 (including)3.4.6 (including)
SplunkSplunk3.4.8 (including)3.4.8 (including)
SplunkSplunk3.4.9 (including)3.4.9 (including)
SplunkSplunk3.4.10 (including)3.4.10 (including)
SplunkSplunk3.4.11 (including)3.4.11 (including)
SplunkSplunk3.4.12 (including)3.4.12 (including)
SplunkSplunk3.4.13 (including)3.4.13 (including)
SplunkSplunk3.4.14 (including)3.4.14 (including)
SplunkSplunk4.0 (including)4.0 (including)
SplunkSplunk4.0.1 (including)4.0.1 (including)
SplunkSplunk4.0.2 (including)4.0.2 (including)
SplunkSplunk4.0.3 (including)4.0.3 (including)
SplunkSplunk4.0.4 (including)4.0.4 (including)
SplunkSplunk4.0.5 (including)4.0.5 (including)
SplunkSplunk4.0.6 (including)4.0.6 (including)
SplunkSplunk4.0.7 (including)4.0.7 (including)
SplunkSplunk4.0.8 (including)4.0.8 (including)
SplunkSplunk4.0.9 (including)4.0.9 (including)
SplunkSplunk4.0.10 (including)4.0.10 (including)
SplunkSplunk4.0.11 (including)4.0.11 (including)
SplunkSplunk4.1 (including)4.1 (including)
SplunkSplunk4.1.1 (including)4.1.1 (including)
SplunkSplunk4.1.2 (including)4.1.2 (including)
SplunkSplunk4.1.3 (including)4.1.3 (including)
SplunkSplunk4.1.4 (including)4.1.4 (including)
SplunkSplunk4.1.5 (including)4.1.5 (including)
SplunkSplunk4.1.6 (including)4.1.6 (including)
SplunkSplunk4.1.7 (including)4.1.7 (including)
SplunkSplunk4.1.8 (including)4.1.8 (including)
SplunkSplunk4.2 (including)4.2 (including)
SplunkSplunk4.2.1 (including)4.2.1 (including)
SplunkSplunk4.2.2 (including)4.2.2 (including)
SplunkSplunk4.2.3 (including)4.2.3 (including)
SplunkSplunk4.2.4 (including)4.2.4 (including)

Potential Mitigations

References