Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Splunk | Splunk | 2.1 | 2.1 |
Splunk | Splunk | 2.2 | 2.2 |
Splunk | Splunk | 2.2.1 | 2.2.1 |
Splunk | Splunk | 2.2.3 | 2.2.3 |
Splunk | Splunk | 2.2.6 | 2.2.6 |
Splunk | Splunk | 3.0 | 3.0 |
Splunk | Splunk | 3.0.1 | 3.0.1 |
Splunk | Splunk | 3.0.2 | 3.0.2 |
Splunk | Splunk | 3.1 | 3.1 |
Splunk | Splunk | 3.1.1 | 3.1.1 |
Splunk | Splunk | 3.1.2 | 3.1.2 |
Splunk | Splunk | 3.1.3 | 3.1.3 |
Splunk | Splunk | 3.1.4 | 3.1.4 |
Splunk | Splunk | 3.2 | 3.2 |
Splunk | Splunk | 3.2.1 | 3.2.1 |
Splunk | Splunk | 3.2.2 | 3.2.2 |
Splunk | Splunk | 3.2.3 | 3.2.3 |
Splunk | Splunk | 3.2.4 | 3.2.4 |
Splunk | Splunk | 3.2.5 | 3.2.5 |
Splunk | Splunk | 3.2.6 | 3.2.6 |
Splunk | Splunk | 3.3 | 3.3 |
Splunk | Splunk | 3.3.1 | 3.3.1 |
Splunk | Splunk | 3.3.2 | 3.3.2 |
Splunk | Splunk | 3.3.3 | 3.3.3 |
Splunk | Splunk | 3.3.4 | 3.3.4 |
Splunk | Splunk | 3.4 | 3.4 |
Splunk | Splunk | 3.4.1 | 3.4.1 |
Splunk | Splunk | 3.4.2 | 3.4.2 |
Splunk | Splunk | 3.4.3 | 3.4.3 |
Splunk | Splunk | 3.4.5 | 3.4.5 |
Splunk | Splunk | 3.4.6 | 3.4.6 |
Splunk | Splunk | 3.4.8 | 3.4.8 |
Splunk | Splunk | 3.4.9 | 3.4.9 |
Splunk | Splunk | 3.4.10 | 3.4.10 |
Splunk | Splunk | 3.4.11 | 3.4.11 |
Splunk | Splunk | 3.4.12 | 3.4.12 |
Splunk | Splunk | 3.4.13 | 3.4.13 |
Splunk | Splunk | 3.4.14 | 3.4.14 |
Splunk | Splunk | 4.0 | 4.0 |
Splunk | Splunk | 4.0.1 | 4.0.1 |
Splunk | Splunk | 4.0.2 | 4.0.2 |
Splunk | Splunk | 4.0.3 | 4.0.3 |
Splunk | Splunk | 4.0.4 | 4.0.4 |
Splunk | Splunk | 4.0.5 | 4.0.5 |
Splunk | Splunk | 4.0.6 | 4.0.6 |
Splunk | Splunk | 4.0.7 | 4.0.7 |
Splunk | Splunk | 4.0.8 | 4.0.8 |
Splunk | Splunk | 4.0.9 | 4.0.9 |
Splunk | Splunk | 4.0.10 | 4.0.10 |
Splunk | Splunk | 4.0.11 | 4.0.11 |
Splunk | Splunk | 4.1 | 4.1 |
Splunk | Splunk | 4.1.1 | 4.1.1 |
Splunk | Splunk | 4.1.2 | 4.1.2 |
Splunk | Splunk | 4.1.3 | 4.1.3 |
Splunk | Splunk | 4.1.4 | 4.1.4 |
Splunk | Splunk | 4.1.5 | 4.1.5 |
Splunk | Splunk | 4.1.6 | 4.1.6 |
Splunk | Splunk | 4.1.7 | 4.1.7 |
Splunk | Splunk | 4.1.8 | 4.1.8 |
Splunk | Splunk | 4.2 | 4.2 |
Splunk | Splunk | 4.2.1 | 4.2.1 |
Splunk | Splunk | 4.2.2 | 4.2.2 |
Splunk | Splunk | 4.2.3 | 4.2.3 |
Splunk | Splunk | 4.2.4 | 4.2.4 |
Splunk | Splunk | * | 4.2.5 |