CVE-2024-45739

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*

History

No history.

Information

Published : 2024-10-14 17:15

Updated : 2024-10-17 13:16


NVD link : CVE-2024-45739

Mitre link : CVE-2024-45739

CVE.ORG link : CVE-2024-45739


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-532

Insertion of Sensitive Information into Log File