In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk |
|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:* |
|
| Vendors & Products |
Splunk
Splunk splunk |
Mon, 14 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 14 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes sensitive HTTP parameters to the `_internal` index. This exposure could happen if you configure the Splunk Enterprise `REST_Calls` log channel at the DEBUG logging level. | |
| Title | Sensitive information disclosure in REST_Calls logging channel | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Splunk
Published: 2024-10-14T17:03:38.142Z
Updated: 2025-02-28T11:03:47.990Z
Reserved: 2024-09-05T21:35:21.290Z
Link: CVE-2024-45738
Updated: 2024-10-14T19:23:51.796Z
Status : Analyzed
Published: 2024-10-14T17:15:12.660
Modified: 2024-10-17T13:17:37.723
Link: CVE-2024-45738
No data.