First published: Tue Jan 03 2012(Updated: )
Multiple directory traversal vulnerabilities in Splunk 4.x before 4.2.5 allow remote authenticated users to read arbitrary files via a .. (dot dot) in a URI to (1) Splunk Web or (2) the Splunkd HTTP Server, aka SPL-45243.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | =4.0 | |
Splunk | =4.0.1 | |
Splunk | =4.0.2 | |
Splunk | =4.0.3 | |
Splunk | =4.0.4 | |
Splunk | =4.0.5 | |
Splunk | =4.0.6 | |
Splunk | =4.0.7 | |
Splunk | =4.0.8 | |
Splunk | =4.0.9 | |
Splunk | =4.0.10 | |
Splunk | =4.0.11 | |
Splunk | =4.1 | |
Splunk | =4.1.1 | |
Splunk | =4.1.2 | |
Splunk | =4.1.3 | |
Splunk | =4.1.4 | |
Splunk | =4.1.5 | |
Splunk | =4.1.6 | |
Splunk | =4.1.7 | |
Splunk | =4.1.8 | |
Splunk | =4.2 | |
Splunk | =4.2.1 | |
Splunk | =4.2.2 | |
Splunk | =4.2.3 | |
Splunk | =4.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-4643 is considered high due to the potential for unauthorized access to sensitive files.
To fix CVE-2011-4643, you should upgrade Splunk to version 4.2.5 or later, where the vulnerability is patched.
CVE-2011-4643 affects Splunk versions 4.0.x through 4.2.4.
Yes, CVE-2011-4643 can be exploited remotely by authenticated users through crafted URI requests.
CVE-2011-4643 is associated with directory traversal attacks that allow unauthorized file access.