
CVE-2022-32153 – Splunk Enterprise lacked TLS host name validation
https://notcve.org/view.php?id=CVE-2022-32153
15 Jun 2022 — Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, up... • https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation • CWE-295: Improper Certificate Validation CWE-297: Improper Validation of Certificate with Host Mismatch •

CVE-2022-32152 – Splunk Enterprise lacked TLS cert validation for Splunk-to-Splunk communication by default
https://notcve.org/view.php?id=CVE-2022-32152
15 Jun 2022 — Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, up... • https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation • CWE-295: Improper Certificate Validation •

CVE-2022-32151 – Splunk Enterprise disabled TLS validation using the CA certificate stores in Python 3 libraries by default
https://notcve.org/view.php?id=CVE-2022-32151
15 Jun 2022 — The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries now verify server certificates by default and use the appropriate CA certificate stores for each library. Apps and add-ons that include their own HTTP libraries are not affected. For Splunk Enterprise, update to S... • https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation • CWE-295: Improper Certificate Validation •

CVE-2022-32156 – Splunk Enterprise and Universal Forwarder CLI connections lacked TLS cert validation
https://notcve.org/view.php?id=CVE-2022-32156
14 Jun 2022 — In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI to enable the remediation. The vulnerability does not affect the Splunk... • https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI • CWE-295: Improper Certificate Validation •

CVE-2022-27183 – Reflected XSS in a query parameter of the Monitoring Console
https://notcve.org/view.php?id=CVE-2022-27183
06 May 2022 — The Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions before 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on Splunk Cloud Platform instances. Note that the Cloud Monitoring Console is not impacted. La aplicación de la Consola de Monitorización configurada en modo Distribuido permite un ataque de tipo XSS Reflejado en un parámetro de consulta... • https://research.splunk.com/application/splunk_xss_in_monitoring_console • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-26889 – Path Traversal in search parameter results in external content injection
https://notcve.org/view.php?id=CVE-2022-26889
06 May 2022 — In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing). En las versiones de Splunk Enterprise anteriores a la ... • https://research.splunk.com/application/path_traversal_spl_injection • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-26070 – Error message discloses internal path
https://notcve.org/view.php?id=CVE-2022-26070
06 May 2022 — When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path. The vulnerability impacts Splunk Enterprise versions before 8.1.0. Cuando es manejada una cookie de preautenticación no coincidente, la aplicación filtra el mensaje de error interno en la respuesta, que contiene la ruta del sistema local de Splunk Enterprise. La vulnerabilidad afecta a las versiones de Splunk Enterprise anteriores a l... • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2021-42743 – Local privilege escalation via a default path in Splunk Enterprise Windows
https://notcve.org/view.php?id=CVE-2021-42743
06 May 2022 — A misconfiguration in the node default path allows for local privilege escalation from a lower privileged user to the Splunk user in Splunk Enterprise versions before 8.1.1 on Windows. Una configuración errónea en la ruta por defecto del nodo permite una escalada de privilegios local de un usuario menos privilegiado al usuario de Splunk en Splunk Enterprise versiones anteriores a 8.1.1 en Windows • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html • CWE-427: Uncontrolled Search Path Element •

CVE-2021-33845 – Username enumeration through lockout message in REST API
https://notcve.org/view.php?id=CVE-2021-33845
06 May 2022 — The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors. La API REST de Splunk Enterprise permite enumerar los nombres de usuario por medio del mensaje de error de bloqueo. La vulnerabilidad potencial afecta a las instancias de Splunk Enterprise anteriores a 8.1.7 cuando están configuradas para reprimir los errores de inicio de sesión verboso • https://research.splunk.com/application/splunk_user_enumeration_attempt • CWE-203: Observable Discrepancy •

CVE-2021-31559 – S2S TcpToken authentication bypass
https://notcve.org/view.php?id=CVE-2021-31559
06 May 2022 — A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders. Una petición diseñada omite la autenticación S2S TCP Token escribiendo eventos arbitrarios en un índice en Splunk Enterprise Indexer versiones 8.1 anteriores a 8.1.5 y versiones 8.2 anteriores a 8.2.1. La vulnerabilidad afecta a... • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html • CWE-288: Authentication Bypass Using an Alternate Path or Channel •