CVE-2011-4644

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:2.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:2.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.0:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.6:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.8:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.9:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.10:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.11:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.12:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.13:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:3.4.14:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:4.2.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-01-03 11:55

Updated : 2023-12-10 11:03


NVD link : CVE-2011-4644

Mitre link : CVE-2011-4644

CVE.ORG link : CVE-2011-4644


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-287

Improper Authentication