Unsafe Deserialization of Untrusted Data in Splunk Enterprise for Windows
CVE-2024-23678
Summary
Splunk Enterprise for Windows prior to versions 9.0.8 and 9.1.3 is affected by a vulnerability that improperly handles path input data. This flaw leads to the unsafe deserialization of untrusted data originating from another disk partition on the same machine. Such a security weakness could potentially be exploited to inject malicious data, compromising the integrity and security of the application. Correct sanitization practices are crucial to mitigate this risk and ensure the safe handling of path inputs.
Affected Version(s)
Splunk Enterprise 9.0 < 9.0.8
Splunk Enterprise 9.1 < 9.1.3
Get notified when SecurityVulnerability.io launches alerting đź””
Well keep you posted 📧
News Articles

Splunk Patches CVE-2024-23678 Deserialization bug
Splunk has addressed multiple vulnerabilities in Splunk Enterprise that includes a high-severity deserialization flaw. The vulnerability tracked as CVE-2024-23678 with CVSS score 7.5, impacting the Windows version. The advisory stats that Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3 ...
References
CVSS V3.1
Timeline
- đź“°
First article discovered by TheCyberThrone
Vulnerability published
Vulnerability Reserved