Authenticated User Vulnerability in Splunk Enterprise and Splunk Cloud Platform Could Allow Arbitrary Code Execution
CVE-2024-36983
8HIGH
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 1 July 2024
Summary
In vulnerable versions of Splunk Enterprise and Splunk Cloud Platform, an authenticated user possesses the capability to create an external lookup that invokes a legacy internal function. This function can be exploited to insert malicious code within the Splunk platform installation directory. Consequently, this can lead to the execution of arbitrary code within the Splunk instance, significantly compromising system integrity and data security.
Affected Version(s)
Splunk Cloud Platform 9.1.2312 < 9.1.2312.109
Splunk Cloud Platform 9.1.2308 < 9.1.2308.207
Splunk Enterprise 9.2 < 9.2.2
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Danylo Dmytriiev (DDV_UA)