Page 2 of 48 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file. En las versiones de Splunk Enterprise inferiores a 9.0.8, la utilidad Splunk RapidDiag revela las respuestas del servidor de aplicaciones externas en un archivo de registro. • https://advisory.splunk.com/advisories/SVD-2024-0107 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections. En las versiones de Splunk Enterprise inferiores a 9.0.8 y 9.1.3, el almacén de valores clave de la aplicación Splunk (KV Store) maneja incorrectamente los permisos para los usuarios que usan la interfaz de programación de aplicaciones (API) REST. Potencialmente, esto puede resultar en la eliminación de las colecciones de KV Store. • https://advisory.splunk.com/advisories/SVD-2024-0105 https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •

CVSS: 4.8EPSS: 0%CPEs: 3EXPL: 0

In Splunk Enterprise versions below 9.0.7 and 9.1.2, ineffective escaping in the “Show syntax Highlighted” feature can result in the execution of unauthorized code in a user’s web browser. En las versiones de Splunk Enterprise inferiores a 9.0.7 y 9.1.2, el escape ineficaz en la función "Mostrar sintaxis resaltada" puede resultar en la ejecución de código no autorizado en el navegador web de un usuario. • https://advisory.splunk.com/advisories/SVD-2023-1103 https://research.splunk.com/application/1030bc63-0b37-4ac9-9ae0-9361c955a3cc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 31%CPEs: 3EXPL: 1

In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance. En las versiones de Splunk Enterprise inferiores a 9.0.7 y 9.1.2, Splunk Enterprise no sanitiza de forma segura las transformaciones de lenguaje de hojas de estilo extensibles (XSLT) que proporcionan los usuarios. Esto significa que un atacante puede cargar XSLT malicioso, lo que puede provocar la ejecución remota de código en la instancia de Splunk Enterprise. • https://advisory.splunk.com/advisories/SVD-2023-1104 https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299 https://github.com/nathan31337/Splunk-RCE-poc https://blog.hrncirik.net/cve-2023-46214-analysis https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/splunk_xslt_authenticated_rce.rb • CWE-91: XML Injection (aka Blind XPath Injection) •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk. • https://advisory.splunk.com/advisories/SVD-2023-0806 https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-36: Absolute Path Traversal •