CVE Vulnerabilities

CVE-2011-4644

Improper Authentication

Published: Jan 03, 2012 | Modified: Jan 26, 2012
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Splunk Splunk 3.3.1 3.3.1
Splunk Splunk 4.0.4 4.0.4
Splunk Splunk 2.1 2.1
Splunk Splunk 3.3.4 3.3.4
Splunk Splunk 3.0 3.0
Splunk Splunk 4.0.6 4.0.6
Splunk Splunk 4.1.2 4.1.2
Splunk Splunk 3.2 3.2
Splunk Splunk 4.1.1 4.1.1
Splunk Splunk 4.2.3 4.2.3
Splunk Splunk 4.0 4.0
Splunk Splunk 3.4.13 3.4.13
Splunk Splunk 3.0.1 3.0.1
Splunk Splunk 3.3.2 3.3.2
Splunk Splunk 4.2.2 4.2.2
Splunk Splunk 3.4.9 3.4.9
Splunk Splunk 4.0.3 4.0.3
Splunk Splunk 4.1.8 4.1.8
Splunk Splunk 3.4.10 3.4.10
Splunk Splunk 4.1.3 4.1.3
Splunk Splunk 3.4.8 3.4.8
Splunk Splunk 3.2.3 3.2.3
Splunk Splunk * 4.2.5
Splunk Splunk 4.2 4.2
Splunk Splunk 2.2.3 2.2.3
Splunk Splunk 3.1.1 3.1.1
Splunk Splunk 3.2.2 3.2.2
Splunk Splunk 3.4.3 3.4.3
Splunk Splunk 3.2.1 3.2.1
Splunk Splunk 2.2.1 2.2.1
Splunk Splunk 4.0.8 4.0.8
Splunk Splunk 4.0.5 4.0.5
Splunk Splunk 4.1.5 4.1.5
Splunk Splunk 3.4.11 3.4.11
Splunk Splunk 4.0.9 4.0.9
Splunk Splunk 3.1.2 3.1.2
Splunk Splunk 3.4.6 3.4.6
Splunk Splunk 3.1 3.1
Splunk Splunk 3.2.5 3.2.5
Splunk Splunk 4.0.11 4.0.11
Splunk Splunk 3.4.5 3.4.5
Splunk Splunk 4.2.4 4.2.4
Splunk Splunk 3.4.14 3.4.14
Splunk Splunk 3.4 3.4
Splunk Splunk 3.2.6 3.2.6
Splunk Splunk 4.0.10 4.0.10
Splunk Splunk 3.3 3.3
Splunk Splunk 4.1.7 4.1.7
Splunk Splunk 3.0.2 3.0.2
Splunk Splunk 3.4.2 3.4.2
Splunk Splunk 4.1.4 4.1.4
Splunk Splunk 4.1 4.1
Splunk Splunk 4.0.1 4.0.1
Splunk Splunk 4.1.6 4.1.6
Splunk Splunk 3.4.12 3.4.12
Splunk Splunk 4.0.7 4.0.7
Splunk Splunk 4.0.2 4.0.2
Splunk Splunk 3.2.4 3.2.4
Splunk Splunk 3.1.3 3.1.3
Splunk Splunk 3.1.4 3.1.4
Splunk Splunk 3.3.3 3.3.3
Splunk Splunk 2.2 2.2
Splunk Splunk 3.4.1 3.4.1
Splunk Splunk 4.2.1 4.2.1
Splunk Splunk 2.2.6 2.2.6

Potential Mitigations

References