Low-Privileged User Vulnerability in Splunk Enterprise
CVE-2024-45732
7.1HIGH
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 14 October 2024
Summary
In specific versions of Splunk Enterprise and Splunk Cloud Platform, a vulnerability allows low-privileged users, lacking the 'admin' or 'power' roles, to execute searches as the 'nobody' user within the SplunkDeploymentServerConfig app. This could potentially expose sensitive or restricted data, raising significant security concerns for environments where data access needs strict control.
Affected Version(s)
Splunk Cloud Platform 9.2.2403 < 9.2.2403.103
Splunk Cloud Platform 9.1.2312 < 9.1.2312.110, 9.1.2312.200
Splunk Cloud Platform 9.1.2308 < 9.1.2308.208
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Anton (therceman)