CVE-2024-36986

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 09:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.7
v2 : unknown
v3 : 6.3
References () https://advisory.splunk.com/advisories/SVD-2024-0706 - Vendor Advisory () https://advisory.splunk.com/advisories/SVD-2024-0706 - Vendor Advisory
References () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - Mitigation () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - Mitigation

02 Aug 2024, 15:24

Type Values Removed Values Added
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*
References () https://advisory.splunk.com/advisories/SVD-2024-0706 - () https://advisory.splunk.com/advisories/SVD-2024-0706 - Vendor Advisory
References () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - Mitigation
First Time Splunk cloud
Splunk
Splunk splunk
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 5.7

02 Jul 2024, 12:09

Type Values Removed Values Added
Summary
  • (es) En las versiones de Splunk Enterprise inferiores a 9.2.2, 9.1.5 y 9.0.10 y en las versiones de Splunk Cloud Platform inferiores a 9.1.2312.200 y 9.1.2308.207, un usuario autenticado podría ejecutar comandos riesgosos utilizando los permisos de un usuario con mayores privilegios para evitar SPL. salvaguardias para comandos riesgosos en Analytics Workspace. La vulnerabilidad requiere que el usuario autenticado realice phishing a la víctima engañándola para que inicie una solicitud dentro de su navegador. El usuario autenticado no debería poder explotar la vulnerabilidad a voluntad.

01 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-01 17:15

Updated : 2024-11-21 09:22


NVD link : CVE-2024-36986

Mitre link : CVE-2024-36986

CVE.ORG link : CVE-2024-36986


JSON object : View

Products Affected

splunk

  • cloud
  • splunk
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo