QID 379306

Date Published: 2024-02-20

QID 379306: Splunk Enterprise Sensitive Information Disclosure Vulnerability (SVD-2024-0106)

Splunk software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.
In Splunk Enterprise, the mrollup SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.

Affected Versions:
Splunk Enterprise versions from 9.0.0 prior to 9.0.8
Splunk Enterprise versions from 9.1.0 prior to 9.1.3

QID Detection Logic (Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable along with splunk web configuration check using "/etc/system/default/limit.conf" or "/etc/system/local/limit.conf".
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".

Successful exploitation of this vulnerability lets a low-privileged user view metrics on an index that they do not have permission to view.

  • CVSS V3 rated as Medium - 3.5 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2024-0106 for more details.

    Workaround:
    If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. If users do not need access to metrics indexes, remove authorization to search those indexes.

    Vendor References

    CVEs related to QID 379306

    Software Advisories
    Advisory ID Software Component Link
    SVD-2024-0106 URL Logo advisory.splunk.com/advisories/SVD-2024-0106