CVE-2023-32709

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://advisory.splunk.com/advisories/SVD-2023-0604 - Vendor Advisory () https://advisory.splunk.com/advisories/SVD-2023-0604 - Vendor Advisory
References () https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/ - Vendor Advisory () https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/ - Vendor Advisory

07 Jun 2023, 14:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
CWE NVD-CWE-Other
References (MISC) https://advisory.splunk.com/advisories/SVD-2023-0604 - (MISC) https://advisory.splunk.com/advisories/SVD-2023-0604 - Vendor Advisory
References (MISC) https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/ - (MISC) https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/ - Vendor Advisory
First Time Splunk splunk Cloud Platform
Splunk splunk
Splunk

01 Jun 2023, 17:29

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 17:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32709

Mitre link : CVE-2023-32709

CVE.ORG link : CVE-2023-32709


JSON object : View

Products Affected

splunk

  • splunk_cloud_platform
  • splunk
CWE
CWE-285

Improper Authorization

NVD-CWE-Other