CVE-2023-32709

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-06-01 17:15

Updated : 2024-04-10 01:15


NVD link : CVE-2023-32709

Mitre link : CVE-2023-32709

CVE.ORG link : CVE-2023-32709


JSON object : View

Products Affected

splunk

  • splunk
  • splunk_cloud_platform
CWE
NVD-CWE-Other CWE-285

Improper Authorization