QID 378030

Date Published: 2023-03-27

QID 378030: Splunk Enterprise REST API Enumeration Vulnerability (SVD-2022-0502)

The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message.

Note:- Mitigation is available, hence making this detection practice.

Affected Versions:
Splunk Enterprise 8.1.6 and lower

The vulnerability allows enumeration of usernames via the lockout error message

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2022-0502Workaround:
    If the Splunk Enterprise instance uses the default verboseLoginFailMsg or sets verboseLoginFailMsg to true, it is not impacted. However, setting verboseLoginFailMsg to false.
    Vendor References

    CVEs related to QID 378030

    Software Advisories
    Advisory ID Software Component Link
    SVD-2022-0502 URL Logo advisory.splunk.com/advisories/SVD-2022-0502