Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-4644


Splunk 4.2.5 and earlier, when a Free license is selected, enables potentially undesirable functionality within an environment that intentionally does not support authentication, which allows remote attackers to (1) read arbitrary files via a management-console session that leverages the ability to create crafted data sources, or (2) execute management commands via an HTTP request.


Published

2012-01-03T11:55:04.047

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.3 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application splunk splunk ≤ 4.2.5 Yes
Application splunk splunk 2.1 Yes
Application splunk splunk 2.2 Yes
Application splunk splunk 2.2.1 Yes
Application splunk splunk 2.2.3 Yes
Application splunk splunk 2.2.6 Yes
Application splunk splunk 3.0 Yes
Application splunk splunk 3.0.1 Yes
Application splunk splunk 3.0.2 Yes
Application splunk splunk 3.1 Yes
Application splunk splunk 3.1.1 Yes
Application splunk splunk 3.1.2 Yes
Application splunk splunk 3.1.3 Yes
Application splunk splunk 3.1.4 Yes
Application splunk splunk 3.2 Yes
Application splunk splunk 3.2.1 Yes
Application splunk splunk 3.2.2 Yes
Application splunk splunk 3.2.3 Yes
Application splunk splunk 3.2.4 Yes
Application splunk splunk 3.2.5 Yes
Application splunk splunk 3.2.6 Yes
Application splunk splunk 3.3 Yes
Application splunk splunk 3.3.1 Yes
Application splunk splunk 3.3.2 Yes
Application splunk splunk 3.3.3 Yes
Application splunk splunk 3.3.4 Yes
Application splunk splunk 3.4 Yes
Application splunk splunk 3.4.1 Yes
Application splunk splunk 3.4.2 Yes
Application splunk splunk 3.4.3 Yes
Application splunk splunk 3.4.5 Yes
Application splunk splunk 3.4.6 Yes
Application splunk splunk 3.4.8 Yes
Application splunk splunk 3.4.9 Yes
Application splunk splunk 3.4.10 Yes
Application splunk splunk 3.4.11 Yes
Application splunk splunk 3.4.12 Yes
Application splunk splunk 3.4.13 Yes
Application splunk splunk 3.4.14 Yes
Application splunk splunk 4.0 Yes
Application splunk splunk 4.0.1 Yes
Application splunk splunk 4.0.2 Yes
Application splunk splunk 4.0.3 Yes
Application splunk splunk 4.0.4 Yes
Application splunk splunk 4.0.5 Yes
Application splunk splunk 4.0.6 Yes
Application splunk splunk 4.0.7 Yes
Application splunk splunk 4.0.8 Yes
Application splunk splunk 4.0.9 Yes
Application splunk splunk 4.0.10 Yes
Application splunk splunk 4.0.11 Yes
Application splunk splunk 4.1 Yes
Application splunk splunk 4.1.1 Yes
Application splunk splunk 4.1.2 Yes
Application splunk splunk 4.1.3 Yes
Application splunk splunk 4.1.4 Yes
Application splunk splunk 4.1.5 Yes
Application splunk splunk 4.1.6 Yes
Application splunk splunk 4.1.7 Yes
Application splunk splunk 4.1.8 Yes
Application splunk splunk 4.2 Yes
Application splunk splunk 4.2.1 Yes
Application splunk splunk 4.2.2 Yes
Application splunk splunk 4.2.3 Yes
Application splunk splunk 4.2.4 Yes

References