CVE-2023-32709

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*

History

07 Jun 2023, 14:26

Type Values Removed Values Added
CWE NVD-CWE-Other
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
First Time Splunk
Splunk splunk Cloud Platform
Splunk splunk
References (MISC) https://advisory.splunk.com/advisories/SVD-2023-0604 - (MISC) https://advisory.splunk.com/advisories/SVD-2023-0604 - Vendor Advisory
References (MISC) https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/ - (MISC) https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/ - Vendor Advisory

01 Jun 2023, 17:29

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 17:15

Updated : 2024-04-10 01:15


NVD link : CVE-2023-32709

Mitre link : CVE-2023-32709

CVE.ORG link : CVE-2023-32709


JSON object : View

Products Affected

splunk

  • splunk_cloud_platform
  • splunk
CWE
NVD-CWE-Other CWE-285

Improper Authorization