CVE-2011-4644
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
03/01/2012
Last modified:
11/04/2025
Description
Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:* | 4.2.5 (including) | |
cpe:2.3:a:splunk:splunk:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:2.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:2.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:2.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:splunk:splunk:3.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.exploit-db.com/exploits/18245/
- http://www.sec-1.com/blog/?p=233
- http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf
- http://www.exploit-db.com/exploits/18245/
- http://www.sec-1.com/blog/?p=233
- http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf