mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
135 lines
4.2 KiB
JSON
135 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2024-29945",
|
|
"sourceIdentifier": "prodsec@splunk.com",
|
|
"published": "2024-03-27T17:15:54.087",
|
|
"lastModified": "2024-04-10T01:15:18.693",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En las versiones de Splunk Enterprise inferiores a 9.2.1, 9.1.4 y 9.0.9, el software potencialmente expone tokens de autenticaci\u00f3n durante el proceso de validaci\u00f3n del token. Esta exposici\u00f3n ocurre cuando Splunk Enterprise se ejecuta en modo de depuraci\u00f3n o el componente JsonWebToken se ha configurado para registrar su actividad en el nivel de registro DEBUG. "
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "prodsec@splunk.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-532"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "prodsec@splunk.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-532"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "9.0.0",
|
|
"versionEndExcluding": "9.0.9",
|
|
"matchCriteriaId": "1A74446C-DAAB-4030-99BF-3DFA48BAA885"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "9.1.0",
|
|
"versionEndExcluding": "9.1.4",
|
|
"matchCriteriaId": "6672A8C0-21AA-4534-B789-E1BCC7DCFEF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
|
"versionStartIncluding": "9.2.0",
|
|
"versionEndExcluding": "9.2.1",
|
|
"matchCriteriaId": "39900641-B270-4F6C-8E33-CB3124B0E914"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-0301",
|
|
"source": "prodsec@splunk.com",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://research.splunk.com/application/9a67e749-d291-40dd-8376-d422e7ecf8b5",
|
|
"source": "prodsec@splunk.com",
|
|
"tags": [
|
|
"Technical Description",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |