// For flags

CVE-2011-4642

Splunk - Remote Command Execution

Severity Score

4.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

mappy.py in Splunk Web in Splunk 4.2.x before 4.2.5 does not properly restrict use of the mappy command to access Python classes, which allows remote authenticated administrators to execute arbitrary code by leveraging the sys module in a request to the search application, as demonstrated by a cross-site request forgery (CSRF) attack, aka SPL-45172.

mappy.py de Web Splunk de Splunk 4.2.x anteriores a 4.2.5 no restringen apropiadamente el uso del comando "mappy" para acceder a clases Python, lo que permite a administradores autenticados remotos ejecutar código arbitrario utilizando el módulo sys en una petición al motor de búsqueda, como se ha demostrado con un ataque de falsificación de petición en sitios cruzados (CSRF), también conocido como SPL-45172.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-11-30 CVE Reserved
  • 2011-12-15 CVE Published
  • 2011-12-15 First Exploit
  • 2024-08-07 CVE Updated
  • 2024-08-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2
Search vendor "Splunk" for product "Splunk" and version "4.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.1
Search vendor "Splunk" for product "Splunk" and version "4.2.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.2
Search vendor "Splunk" for product "Splunk" and version "4.2.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.3
Search vendor "Splunk" for product "Splunk" and version "4.2.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.4
Search vendor "Splunk" for product "Splunk" and version "4.2.4"
-
Affected