René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

159 lines
5.7 KiB
JSON

{
"id": "CVE-2022-32157",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2022-06-15T17:15:09.200",
"lastModified": "2022-06-24T00:51:02.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation."
},
{
"lang": "es",
"value": "Los servidores de implementaci\u00f3n de Splunk Enterprise en versiones anteriores a 9.0, permiten una descarga no autenticada de paquetes de reenv\u00edo. La correcci\u00f3n requiere que actualice el servidor de implementaci\u00f3n a versi\u00f3n 9.0 y que configure la autenticaci\u00f3n para los servidores de implementaci\u00f3n y los clientes (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Una vez habilitada, los servidores de implantaci\u00f3n s\u00f3lo pueden administrar las versiones 9.0 y superiores de Universal Forwarder. Aunque la vulnerabilidad no afecta directamente a Universal Forwarders, la correcci\u00f3n requiere la actualizaci\u00f3n de todos los Universal Forwarders que el servidor de implementaci\u00f3n administra a versi\u00f3n 9.0 o superior antes de habilitar la reparaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "9.0",
"matchCriteriaId": "A6CE3B90-F8EF-4DC2-80FF-2B791F152037"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients",
"source": "prodsec@splunk.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates",
"source": "prodsec@splunk.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://research.splunk.com/application/splunk_process_injection_forwarder_bundle_downloads/",
"source": "prodsec@splunk.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html",
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}