QID 379307

Date Published: 2024-02-20

QID 379307: Splunk Enterprise Improper Permissions Handling Vulnerability (SVD-2024-0105)

Splunk software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.
Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections.

Affected Versions:
Splunk Enterprise versions from 9.0.0 prior to 9.0.8
Splunk Enterprise versions from 9.1.0 prior to 9.1.3

QID Detection Logic (Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable along with splunk web configuration check using "/etc/system/default/limit.conf" or "/etc/system/local/limit.conf".
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".
Note: This QID doesn't check for the available workaround, hence marked potential.

Successful exploitation of this vulnerability results in the deletion of KV Store collections and loosing the Integrity of files and sensitive information

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Low - 1.9 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2024-0105 for more details.

    Workaround:
    Remove the list_all_objects capability from users that do not require it. If you are not using KV Store, you can disable it.

    Vendor References

    CVEs related to QID 379307

    Software Advisories
    Advisory ID Software Component Link
    SVD-2024-0105 URL Logo advisory.splunk.com/advisories/SVD-2024-0105