The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
References
Link | Resource |
---|---|
https://research.splunk.com/application/splunk_user_enumeration_attempt/ | Vendor Advisory |
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html | Vendor Advisory |
https://research.splunk.com/application/splunk_user_enumeration_attempt/ | Vendor Advisory |
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://research.splunk.com/application/splunk_user_enumeration_attempt/ - Vendor Advisory | |
References | () https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html - Vendor Advisory |
Information
Published : 2022-05-06 17:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33845
Mitre link : CVE-2021-33845
CVE.ORG link : CVE-2021-33845
JSON object : View
Products Affected
splunk
- splunk
CWE
CWE-203
Observable Discrepancy