
CVE-2011-4643 – Splunk - Remote Command Execution
https://notcve.org/view.php?id=CVE-2011-4643
03 Jan 2012 — Multiple directory traversal vulnerabilities in Splunk 4.x before 4.2.5 allow remote authenticated users to read arbitrary files via a .. (dot dot) in a URI to (1) Splunk Web or (2) the Splunkd HTTP Server, aka SPL-45243. Múltiples vulnerabilidades de salto de directorio en Splunk 4.x anteriores a la versión 4.2.5 permiten a atacantes remotos autenticados leer archivos arbitrarios a través de los caracteres .. (punto punto) en una URI a (1) Web Splunk o (2) el servidor HTTP Splunkd, también conocido como SP... • https://www.exploit-db.com/exploits/18245 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2011-4644 – Splunk - Remote Command Execution
https://notcve.org/view.php?id=CVE-2011-4644
03 Jan 2012 — Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request. Splunk versión 4.2.5 y anteriores, cuando se selecciona una licencia Gratuita, habilita funciones potencialmente indeseables en... • https://www.exploit-db.com/exploits/18245 • CWE-287: Improper Authentication •

CVE-2010-3322
https://notcve.org/view.php?id=CVE-2010-3322
14 Sep 2010 — The XML parser in Splunk 4.0.0 through 4.1.4 allows remote authenticated users to obtain sensitive information and gain privileges via an XML External Entity (XXE) attack to unknown vectors. El parser XML en Splunk 4.0.0 a 4.1.4 permite a atacantes remotos autenticados obtener información sensible y escalar privilegios mediante un ataque XML External Entity (XXE) a vectores desconocidos. • http://www.splunk.com/view/SP-CAAAFQ6 • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2010-3323
https://notcve.org/view.php?id=CVE-2010-3323
14 Sep 2010 — Splunk 4.0.0 through 4.1.4 allows remote attackers to conduct session hijacking attacks and obtain the splunkd session key via vectors related to the SPLUNKD_SESSION_KEY parameter. Splunk 4.0.0 a 4.1.4 permite a atacantes remotos llevar a cabo ataques de secuestro de sesión y obtener la llave de sesión splunkd mediante vectores relacionados al parámetro SPLUNKD_SESSION_KEY. • http://www.splunk.com/view/SP-CAAAFQ6 •