fkie_cve-2011-4644
Vulnerability from fkie_nvd
Published
2012-01-03 11:55
Modified
2025-04-11 00:51
Severity ?
Summary
Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.
Impacted products
Vendor Product Version
splunk splunk *
splunk splunk 2.1
splunk splunk 2.2
splunk splunk 2.2.1
splunk splunk 2.2.3
splunk splunk 2.2.6
splunk splunk 3.0
splunk splunk 3.0.1
splunk splunk 3.0.2
splunk splunk 3.1
splunk splunk 3.1.1
splunk splunk 3.1.2
splunk splunk 3.1.3
splunk splunk 3.1.4
splunk splunk 3.2
splunk splunk 3.2.1
splunk splunk 3.2.2
splunk splunk 3.2.3
splunk splunk 3.2.4
splunk splunk 3.2.5
splunk splunk 3.2.6
splunk splunk 3.3
splunk splunk 3.3.1
splunk splunk 3.3.2
splunk splunk 3.3.3
splunk splunk 3.3.4
splunk splunk 3.4
splunk splunk 3.4.1
splunk splunk 3.4.2
splunk splunk 3.4.3
splunk splunk 3.4.5
splunk splunk 3.4.6
splunk splunk 3.4.8
splunk splunk 3.4.9
splunk splunk 3.4.10
splunk splunk 3.4.11
splunk splunk 3.4.12
splunk splunk 3.4.13
splunk splunk 3.4.14
splunk splunk 4.0
splunk splunk 4.0.1
splunk splunk 4.0.2
splunk splunk 4.0.3
splunk splunk 4.0.4
splunk splunk 4.0.5
splunk splunk 4.0.6
splunk splunk 4.0.7
splunk splunk 4.0.8
splunk splunk 4.0.9
splunk splunk 4.0.10
splunk splunk 4.0.11
splunk splunk 4.1
splunk splunk 4.1.1
splunk splunk 4.1.2
splunk splunk 4.1.3
splunk splunk 4.1.4
splunk splunk 4.1.5
splunk splunk 4.1.6
splunk splunk 4.1.7
splunk splunk 4.1.8
splunk splunk 4.2
splunk splunk 4.2.1
splunk splunk 4.2.2
splunk splunk 4.2.3
splunk splunk 4.2.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD38C847-6E9E-4824-8810-D9EB67A12C37",
              "versionEndIncluding": "4.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "021D17D5-0586-479D-83C6-B2052C2E7A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6ABF7F-D546-4209-8436-E12269416051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2A3889-653A-43FC-8DF5-DD0739761FA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D784472-E3E2-4237-8478-35919E0441E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7EBCA0-DB27-4461-8DB4-4982CEF6A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72C0079-D8F9-43D9-B901-66FBD2763728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B125D64A-773B-475A-AAC9-82B459A1502F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "683FA4D9-BB9C-4369-AE01-F466B79E20F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "636524AA-53A0-4E02-B38A-2771E3C49C09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A280EC45-A2CE-4E7C-8267-36C304C6A14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB65F8D-B7F7-4C34-A9E6-90BAC14B93F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "39728F28-A8E7-4A3B-ACFA-F97CD51E03D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C9B48A-72EC-42CB-9C4E-A25CE64ADE71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09F035-CECE-4F1D-B77D-D5F267A7FDE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD740D5-2C0A-47BA-9B03-E1862508C669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0341FDEA-5134-4472-BF4B-0FE95C461F6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304FF51-EE05-490A-B919-CCFD2E7977FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA8110C3-805C-4552-BAB1-0993D399293F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2522C6-710E-48D6-B5B0-FFEB1D79DC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "61812C19-2E7F-4630-BF2A-96ACFE3BABB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4904B-57A8-4BE5-B4D9-B529AA44F860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A70F7A-9893-450E-B0CF-7E46D21C9ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "53070C99-9A5A-4913-AE1F-6053294E3885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "573F58AA-D2F4-4691-9FB3-B88AF0DDF3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA3C10-5A70-49A1-B6D2-3D585009AC46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F146AAF2-E3C6-4245-B7CE-394B0FE5ED5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C878B618-5B57-45D5-922B-F8BFEEA6DFA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "191EA6C2-5774-45A2-8B3D-7889F85F30CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AEFF4F-8FBC-446B-BDB5-303EE9BBCADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8291844F-8199-44C1-A8AA-42F715902C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A81C601-A39A-4963-AFBC-1E7B7A12E132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4866887F-1BC5-4AAD-ADE1-1C8BBF8846EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17902DB-9EF7-4F83-9AD7-08DCE5A6269C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4754E5-793C-48DE-952B-D0FB160E28E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F454E4A-1A08-471D-9A62-84A049DF6D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D662DA49-4569-4079-BDFE-361B0D78D7A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4260AF02-F859-45A7-B95D-EE41B508DEEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "35ACFA65-79E5-493A-A1B7-B0E4B953EFA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCFC155-E9C9-4AE3-9CB8-D2244B9E0269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "368E31F0-E8F2-459E-B78E-EEC3AB544669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDCB0EF9-08B5-4B91-876D-2C7CF7880AF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1709D44B-DC91-4BCC-982F-7BE361A09FF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "62042A83-23C7-478A-BE5C-8C66B6FB59C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB5CDED-459E-4AF9-8747-1F58FA1950E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0705659E-3230-4C28-BA56-F1F2E8BEB83A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD076DE-EBF4-4829-847A-8B20DD614414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B16311C2-2BB3-42E3-BFF8-860467C10611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "07F6F485-280B-408C-A381-76807862785D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "551D7F83-61DD-4333-86ED-B1D38659B76E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BD38F5-B7C6-4CE9-A1B0-1E201CD0979E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B16A56F-EACF-47AC-B541-2D865CC31705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C96B57A4-D586-444B-BD14-311AEBC40C00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "335BA0E8-428B-4163-A809-90BEE79A7395",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AE5B6A8-FB1E-4C0A-AC53-C0ABABE595C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE95A88B-F94B-4B3C-B0FC-0202E9E70FC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "01CE667B-19F8-4ACE-BCF1-5CC0C1862720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "74576145-857B-4A73-A9DE-B8CD6D45BB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5323DA2-5E22-428C-98E9-EA3E9927C1E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EE64CA-F199-4594-A8FA-CF5138492BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "987B0894-735C-4E68-876B-C3041F36D4DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ABEF8-D38E-49CF-A91B-F007DA4FBAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8AC9B9-3A83-4899-85BC-798BEFE90AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD250E15-098A-4AF6-89E2-E25A98E55EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:splunk:splunk:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9FD9D3-6E15-45A4-B066-2BA17F4D6512",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request."
    },
    {
      "lang": "es",
      "value": "Splunk versi\u00f3n 4.2.5 y anteriores, cuando se selecciona una licencia Gratuita, habilita funciones potencialmente indeseables en un entorno que intencionalmente no admite la autenticaci\u00f3n, lo que permite a los atacantes remotos (1) leer archivos arbitrarios por medio de una sesi\u00f3n de la consola de administraci\u00f3n que aprovecha la capacidad de crear fuentes de datos dise\u00f1ados, o (2) ejecutar comandos de administraci\u00f3n por medio de una petici\u00f3n HTTP."
    }
  ],
  "id": "CVE-2011-4644",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-03T11:55:04.047",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18245/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/?p=233"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18245/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/?p=233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…