QID 379306
Date Published: 2024-02-20
QID 379306: Splunk Enterprise Sensitive Information Disclosure Vulnerability (SVD-2024-0106)
Splunk software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.
In Splunk Enterprise, the mrollup SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.
Affected Versions:
Splunk Enterprise versions from 9.0.0 prior to 9.0.8
Splunk Enterprise versions from 9.1.0 prior to 9.1.3
QID Detection Logic (Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable along with splunk web configuration check using "/etc/system/default/limit.conf" or "/etc/system/local/limit.conf".
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".
Successful exploitation of this vulnerability lets a low-privileged user view metrics on an index that they do not have permission to view.
Workaround:
If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers.
If users do not need access to metrics indexes, remove authorization to search those indexes.
- SVD-2024-0106 -
advisory.splunk.com/advisories/SVD-2024-0106
CVEs related to QID 379306
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SVD-2024-0106 |
|