mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
103 lines
3.6 KiB
JSON
103 lines
3.6 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-45739",
|
|
"ASSIGNER": "prodsec@splunk.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.",
|
|
"cweId": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Splunk",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Splunk Enterprise",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.3",
|
|
"version_value": "9.3.1"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.2",
|
|
"version_value": "9.2.3"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1",
|
|
"version_value": "9.1.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009",
|
|
"refsource": "MISC",
|
|
"name": "https://advisory.splunk.com/advisories/SVD-2024-1009"
|
|
},
|
|
{
|
|
"url": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/",
|
|
"refsource": "MISC",
|
|
"name": "https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "SVD-2024-1009"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Eric McGinnis, Splunk"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "Rod Soto, Splunk"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
"version": "3.1",
|
|
"baseScore": 4.9,
|
|
"baseSeverity": "MEDIUM"
|
|
}
|
|
]
|
|
}
|
|
} |