CVE-2011-4643

Splunk - Path Traversal

Title source: rule
STIX 2.1

Description

Multiple directory traversal vulnerabilities in Splunk 4.x before 4.2.5 allow remote authenticated users to read arbitrary files via a .. (dot dot) in a URI to (1) Splunk Web or (2) the Splunkd HTTP Server, aka SPL-45243.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Gary O'Leary-Steele · pythonremotemultiple
https://www.exploit-db.com/exploits/18245

References (7)

Core 7
Core References
Various Sources x_refsource_misc
http://www.sec-1.com/blog/?p=233
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47232
Vendor Advisory x_refsource_confirm
http://www.splunk.com/view/SP-CAAAGMM
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1026451
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72244
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18245/

Scores

EPSS 0.0925
EPSS Percentile 92.7%

Details

CWE
CWE-22
Status published
Products (26)
splunk/splunk 4.0
splunk/splunk 4.0.1
splunk/splunk 4.0.2
splunk/splunk 4.0.3
splunk/splunk 4.0.4
splunk/splunk 4.0.5
splunk/splunk 4.0.6
splunk/splunk 4.0.7
splunk/splunk 4.0.8
splunk/splunk 4.0.9
... and 16 more
Published Jan 03, 2012
Tracked Since Feb 18, 2026