01 Jui 2023
Vulnérabilité CVE-2023-32709 CVE Vulnerability
In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint. (CVSS:0.0) (Last Update:2023-06-01)
Vulnerability Details : In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint. Publish Date : 2023-06-01 Last Update Date : 2023-06-01 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2023-32709
- References For CVE-2023-32709
| |||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2023-32709There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |