// For flags

CVE-2011-4644

Splunk - Remote Command Execution

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.

Splunk versión 4.2.5 y anteriores, cuando se selecciona una licencia Gratuita, habilita funciones potencialmente indeseables en un entorno que intencionalmente no admite la autenticación, lo que permite a los atacantes remotos (1) leer archivos arbitrarios por medio de una sesión de la consola de administración que aprovecha la capacidad de crear fuentes de datos diseñados, o (2) ejecutar comandos de administración por medio de una petición HTTP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-11-30 CVE Reserved
  • 2011-12-15 First Exploit
  • 2012-01-03 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
<= 4.2.5
Search vendor "Splunk" for product "Splunk" and version " <= 4.2.5"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
2.1
Search vendor "Splunk" for product "Splunk" and version "2.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
2.2
Search vendor "Splunk" for product "Splunk" and version "2.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
2.2.1
Search vendor "Splunk" for product "Splunk" and version "2.2.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
2.2.3
Search vendor "Splunk" for product "Splunk" and version "2.2.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
2.2.6
Search vendor "Splunk" for product "Splunk" and version "2.2.6"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.0
Search vendor "Splunk" for product "Splunk" and version "3.0"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.0.1
Search vendor "Splunk" for product "Splunk" and version "3.0.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.0.2
Search vendor "Splunk" for product "Splunk" and version "3.0.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.1
Search vendor "Splunk" for product "Splunk" and version "3.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.1.1
Search vendor "Splunk" for product "Splunk" and version "3.1.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.1.2
Search vendor "Splunk" for product "Splunk" and version "3.1.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.1.3
Search vendor "Splunk" for product "Splunk" and version "3.1.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.1.4
Search vendor "Splunk" for product "Splunk" and version "3.1.4"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2
Search vendor "Splunk" for product "Splunk" and version "3.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2.1
Search vendor "Splunk" for product "Splunk" and version "3.2.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2.2
Search vendor "Splunk" for product "Splunk" and version "3.2.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2.3
Search vendor "Splunk" for product "Splunk" and version "3.2.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2.4
Search vendor "Splunk" for product "Splunk" and version "3.2.4"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2.5
Search vendor "Splunk" for product "Splunk" and version "3.2.5"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.2.6
Search vendor "Splunk" for product "Splunk" and version "3.2.6"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.3
Search vendor "Splunk" for product "Splunk" and version "3.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.3.1
Search vendor "Splunk" for product "Splunk" and version "3.3.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.3.2
Search vendor "Splunk" for product "Splunk" and version "3.3.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.3.3
Search vendor "Splunk" for product "Splunk" and version "3.3.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.3.4
Search vendor "Splunk" for product "Splunk" and version "3.3.4"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4
Search vendor "Splunk" for product "Splunk" and version "3.4"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.1
Search vendor "Splunk" for product "Splunk" and version "3.4.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.2
Search vendor "Splunk" for product "Splunk" and version "3.4.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.3
Search vendor "Splunk" for product "Splunk" and version "3.4.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.5
Search vendor "Splunk" for product "Splunk" and version "3.4.5"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.6
Search vendor "Splunk" for product "Splunk" and version "3.4.6"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.8
Search vendor "Splunk" for product "Splunk" and version "3.4.8"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.9
Search vendor "Splunk" for product "Splunk" and version "3.4.9"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.10
Search vendor "Splunk" for product "Splunk" and version "3.4.10"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.11
Search vendor "Splunk" for product "Splunk" and version "3.4.11"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.12
Search vendor "Splunk" for product "Splunk" and version "3.4.12"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.13
Search vendor "Splunk" for product "Splunk" and version "3.4.13"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
3.4.14
Search vendor "Splunk" for product "Splunk" and version "3.4.14"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0
Search vendor "Splunk" for product "Splunk" and version "4.0"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.1
Search vendor "Splunk" for product "Splunk" and version "4.0.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.2
Search vendor "Splunk" for product "Splunk" and version "4.0.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.3
Search vendor "Splunk" for product "Splunk" and version "4.0.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.4
Search vendor "Splunk" for product "Splunk" and version "4.0.4"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.5
Search vendor "Splunk" for product "Splunk" and version "4.0.5"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.6
Search vendor "Splunk" for product "Splunk" and version "4.0.6"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.7
Search vendor "Splunk" for product "Splunk" and version "4.0.7"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.8
Search vendor "Splunk" for product "Splunk" and version "4.0.8"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.9
Search vendor "Splunk" for product "Splunk" and version "4.0.9"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.10
Search vendor "Splunk" for product "Splunk" and version "4.0.10"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.0.11
Search vendor "Splunk" for product "Splunk" and version "4.0.11"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1
Search vendor "Splunk" for product "Splunk" and version "4.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.1
Search vendor "Splunk" for product "Splunk" and version "4.1.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.2
Search vendor "Splunk" for product "Splunk" and version "4.1.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.3
Search vendor "Splunk" for product "Splunk" and version "4.1.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.4
Search vendor "Splunk" for product "Splunk" and version "4.1.4"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.5
Search vendor "Splunk" for product "Splunk" and version "4.1.5"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.6
Search vendor "Splunk" for product "Splunk" and version "4.1.6"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.7
Search vendor "Splunk" for product "Splunk" and version "4.1.7"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.1.8
Search vendor "Splunk" for product "Splunk" and version "4.1.8"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2
Search vendor "Splunk" for product "Splunk" and version "4.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.1
Search vendor "Splunk" for product "Splunk" and version "4.2.1"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.2
Search vendor "Splunk" for product "Splunk" and version "4.2.2"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.3
Search vendor "Splunk" for product "Splunk" and version "4.2.3"
-
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
4.2.4
Search vendor "Splunk" for product "Splunk" and version "4.2.4"
-
Affected