CVE-2021-33845

The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () https://research.splunk.com/application/splunk_user_enumeration_attempt/ - Vendor Advisory () https://research.splunk.com/application/splunk_user_enumeration_attempt/ - Vendor Advisory
References () https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html - Vendor Advisory () https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html - Vendor Advisory

Information

Published : 2022-05-06 17:15

Updated : 2024-11-21 06:09


NVD link : CVE-2021-33845

Mitre link : CVE-2021-33845

CVE.ORG link : CVE-2021-33845


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-203

Observable Discrepancy