CVE-2011-4644

Splunk < 4.2.5 - Authentication Bypass

Title source: rule
STIX 2.1

Description

Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Gary O'Leary-Steele · pythonremotemultiple
https://www.exploit-db.com/exploits/18245

References (3)

Core 3
Core References
Exploit x_refsource_misc
http://www.sec-1.com/blog/?p=233
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18245/

Scores

EPSS 0.0499
EPSS Percentile 89.7%

Details

CWE
CWE-287
Status published
Products (50)
splunk/splunk 2.1
splunk/splunk 2.2
splunk/splunk 2.2.1
splunk/splunk 2.2.3
splunk/splunk 2.2.6
splunk/splunk 3.0
splunk/splunk 3.0.1
splunk/splunk 3.0.2
splunk/splunk 3.1
splunk/splunk 3.1.1
... and 40 more
Published Jan 03, 2012
Tracked Since Feb 18, 2026