In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.
References
Configurations
No configuration.
History
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisory.splunk.com/advisories/SVD-2024-0703 - | |
References | () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - |
15 Oct 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE |
08 Jul 2024, 14:18
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-75 |
02 Jul 2024, 12:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-01 17:15
Updated : 2024-11-21 09:22
NVD link : CVE-2024-36983
Mitre link : CVE-2024-36983
CVE.ORG link : CVE-2024-36983
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')