
CVE-2022-27183 – Reflected XSS in a query parameter of the Monitoring Console
https://notcve.org/view.php?id=CVE-2022-27183
06 May 2022 — The Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions before 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on Splunk Cloud Platform instances. Note that the Cloud Monitoring Console is not impacted. La aplicación de la Consola de Monitorización configurada en modo Distribuido permite un ataque de tipo XSS Reflejado en un parámetro de consulta... • https://research.splunk.com/application/splunk_xss_in_monitoring_console • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-26889 – Path Traversal in search parameter results in external content injection
https://notcve.org/view.php?id=CVE-2022-26889
06 May 2022 — In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing). En las versiones de Splunk Enterprise anteriores a la ... • https://research.splunk.com/application/path_traversal_spl_injection • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-26070 – Error message discloses internal path
https://notcve.org/view.php?id=CVE-2022-26070
06 May 2022 — When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path. The vulnerability impacts Splunk Enterprise versions before 8.1.0. Cuando es manejada una cookie de preautenticación no coincidente, la aplicación filtra el mensaje de error interno en la respuesta, que contiene la ruta del sistema local de Splunk Enterprise. La vulnerabilidad afecta a las versiones de Splunk Enterprise anteriores a l... • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2021-42743 – Local privilege escalation via a default path in Splunk Enterprise Windows
https://notcve.org/view.php?id=CVE-2021-42743
06 May 2022 — A misconfiguration in the node default path allows for local privilege escalation from a lower privileged user to the Splunk user in Splunk Enterprise versions before 8.1.1 on Windows. Una configuración errónea en la ruta por defecto del nodo permite una escalada de privilegios local de un usuario menos privilegiado al usuario de Splunk en Splunk Enterprise versiones anteriores a 8.1.1 en Windows • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html • CWE-427: Uncontrolled Search Path Element •

CVE-2021-33845 – Username enumeration through lockout message in REST API
https://notcve.org/view.php?id=CVE-2021-33845
06 May 2022 — The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors. La API REST de Splunk Enterprise permite enumerar los nombres de usuario por medio del mensaje de error de bloqueo. La vulnerabilidad potencial afecta a las instancias de Splunk Enterprise anteriores a 8.1.7 cuando están configuradas para reprimir los errores de inicio de sesión verboso • https://research.splunk.com/application/splunk_user_enumeration_attempt • CWE-203: Observable Discrepancy •

CVE-2021-31559 – S2S TcpToken authentication bypass
https://notcve.org/view.php?id=CVE-2021-31559
06 May 2022 — A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders. Una petición diseñada omite la autenticación S2S TCP Token escribiendo eventos arbitrarios en un índice en Splunk Enterprise Indexer versiones 8.1 anteriores a 8.1.5 y versiones 8.2 anteriores a 8.2.1. La vulnerabilidad afecta a... • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVE-2021-26253 – Bypass of Splunk Enterprise's implementation of DUO MFA
https://notcve.org/view.php?id=CVE-2021-26253
06 May 2022 — A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service. Una posible vulnerabilidad en la implementación de DUO MFA de Splunk Enterprise permite omitir la verificación MFA en las versiones de Splunk Enterprise anteriores a 8.1.6. La vulnerabilidad potencial afec... • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html • CWE-287: Improper Authentication •

CVE-2021-3422 – Indexer denial-of-service via malformed S2S request
https://notcve.org/view.php?id=CVE-2021-3422
25 Mar 2022 — The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions before 8.1.3. It does not impact Universal Forwarders. When Splunk forwarding is secured using TLS or a Token, the attack requires compromising the certificate or token, or both. Implementation of either or both r... • https://claroty.com/2022/03/24/blog-research-locking-down-splunk-enterprise-indexers-and-forwarders • CWE-20: Improper Input Validation CWE-125: Out-of-bounds Read •

CVE-2013-6773
https://notcve.org/view.php?id=CVE-2013-6773
23 Jan 2020 — Splunk 5.0.3 has an Unquoted Service Path in Windows for Universal Forwarder which can allow an attacker to escalate privileges Splunk versión 5.0.3, presenta una Ruta de Servicio Sin Comillas en Windows para Universal Forwarder que puede permitir a un atacante escalar privilegios. • http://www.splunk.com/view/SP-CAAAHXG • CWE-269: Improper Privilege Management •

CVE-2013-6772
https://notcve.org/view.php?id=CVE-2013-6772
23 Jan 2020 — Splunk before 5.0.4 lacks X-Frame-Options which can allow Clickjacking Splunk versiones anteriores a 5.0.4, carece de X-Frame-Options que puede permitir un Secuestro del Cliqueo. • http://www.splunk.com/view/SP-CAAAH32 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •