CVE-2024-45739

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*

History

17 Oct 2024, 13:16

Type Values Removed Values Added
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*
References () https://advisory.splunk.com/advisories/SVD-2024-1009 - () https://advisory.splunk.com/advisories/SVD-2024-1009 - Vendor Advisory
References () https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/ - () https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/ - Vendor Advisory
First Time Splunk
Splunk splunk
CWE CWE-532
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9

14 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-14 17:15

Updated : 2024-10-17 13:16


NVD link : CVE-2024-45739

Mitre link : CVE-2024-45739


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-532

Insertion of Sensitive Information into Log File