QID 378030
Date Published: 2023-03-27
QID 378030: Splunk Enterprise REST API Enumeration Vulnerability (SVD-2022-0502)
The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message.
Note:- Mitigation is available, hence making this detection practice.
Affected Versions:
Splunk Enterprise 8.1.6 and lower
The vulnerability allows enumeration of usernames via the lockout error message
Solution
Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2022-0502Workaround:
If the Splunk Enterprise instance uses the default verboseLoginFailMsg or sets verboseLoginFailMsg to true, it is not impacted. However, setting verboseLoginFailMsg to false.
If the Splunk Enterprise instance uses the default verboseLoginFailMsg or sets verboseLoginFailMsg to true, it is not impacted. However, setting verboseLoginFailMsg to false.
Vendor References
- SVD-2022-0502 -
advisory.splunk.com/advisories/SVD-2022-0502
CVEs related to QID 378030
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SVD-2022-0502 |
|