In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level.
Metrics
CVSS Version: 3.1 |
Base Score: 7.2 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-ID: CWE-532 CWE Name: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. Source: Splunk
Common Attack Pattern Enumeration and Classification (CAPEC)