CVE-2024-45739

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*

History

17 Oct 2024, 13:16

Type Values Removed Values Added
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*
CWE CWE-532
References () https://advisory.splunk.com/advisories/SVD-2024-1009 - () https://advisory.splunk.com/advisories/SVD-2024-1009 - Vendor Advisory
References () https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/ - () https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/ - Vendor Advisory
First Time Splunk splunk
Splunk

15 Oct 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.3 y 9.1.6, el software puede exponer las contraseñas de texto plano de los usuarios de Splunk con autenticación nativa local. Esta exposición podría ocurrir cuando configura el canal de registro de Splunk Enterprise AdminManager en el nivel de registro DEBUG.

14 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-14 17:15

Updated : 2024-10-17 13:16


NVD link : CVE-2024-45739

Mitre link : CVE-2024-45739

CVE.ORG link : CVE-2024-45739


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-532

Insertion of Sensitive Information into Log File

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor