Splunk

Splunk

160 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 04.11.2022 23:15:09
  • Last modified 21.11.2024 07:26:47

In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards ....

  • EPSS 0.34%
  • Published 04.11.2022 23:15:09
  • Last modified 21.11.2024 07:26:47

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.

Exploit
  • EPSS 24.41%
  • Published 03.11.2022 23:15:21
  • Last modified 21.11.2024 07:26:48

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.

Exploit
  • EPSS 0.1%
  • Published 03.11.2022 23:15:15
  • Last modified 21.11.2024 07:26:47

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web ena...

  • EPSS 0.26%
  • Published 16.08.2022 21:15:13
  • Last modified 21.11.2024 07:14:59

When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections be...

  • EPSS 0.35%
  • Published 16.08.2022 21:15:13
  • Last modified 21.11.2024 07:14:59

In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drill...

  • EPSS 0.12%
  • Published 16.08.2022 21:15:13
  • Last modified 21.11.2024 07:14:59

In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash ...

  • EPSS 0.29%
  • Published 15.06.2022 17:15:09
  • Last modified 21.11.2024 07:05:51

Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capab...

  • EPSS 0.43%
  • Published 15.06.2022 17:15:09
  • Last modified 21.11.2024 07:05:51

In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential sever...

  • EPSS 0.19%
  • Published 15.06.2022 17:15:09
  • Last modified 21.11.2024 07:05:51

In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configur...