Количество 3
Количество 3
CVE-2025-20381
In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
GHSA-qf9v-6rq4-3w87
In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions.
BDU:2025-16293
Уязвимость приложения для обработки и анализа данных Splunk MCP Server, связанная с ошибками авторизации, позволяющая нарушителю обойти ограничения списка разрешённых команд SPL в MCP (Model Context Protocol)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-20381 In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions. | CVSS3: 5.4 | 0% Низкий | 2 месяца назад | |
GHSA-qf9v-6rq4-3w87 In Splunk MCP Server app versions below 0.2.4, a user with access to the "run_splunk_query" Model Context Protocol (MCP) tool could bypass the SPL command allowlist controls in MCP by embedding SPL commands as sub-searches, leading to unauthorized actions beyond the intended MCP restrictions. | CVSS3: 5.4 | 0% Низкий | 2 месяца назад | |
BDU:2025-16293 Уязвимость приложения для обработки и анализа данных Splunk MCP Server, связанная с ошибками авторизации, позволяющая нарушителю обойти ограничения списка разрешённых команд SPL в MCP (Model Context Protocol) | CVSS3: 5.4 | 0% Низкий | 2 месяца назад |
Уязвимостей на страницу