The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html | vendor advisory |
https://research.splunk.com/application/splunk_user_enumeration_attempt/ | vendor advisory |