QID 379305

Date Published: 2024-01-30

QID 379305: Splunk Enterprise Sensitive Information Disclosure Vulnerability (SVD-2024-0107)

Splunk software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.
The Splunk RapidDiag utility discloses server responses to an external application upload request in a log file. The log files might contain sensitive information.

Affected Versions:
Splunk Enterprise versions from 9.0.0 prior to 9.0.8

QID Detection Logic (Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable along with splunk web configuration check using "/etc/system/default/limit.conf" or "/etc/system/local/limit.conf".
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".

Successful exploitation of this vulnerability discloses sensitive information through server responses to an external application upload request in a log file.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2024-0107 for more details.

    Vendor References

    CVEs related to QID 379305

    Software Advisories
    Advisory ID Software Component Link
    SVD-2024-0107 URL Logo advisory.splunk.com/advisories/SVD-2024-0107