Insufficient Access Control in Splunk Enterprise and Splunk Cloud Platform
CVE-2024-53245
3.1LOW
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 10 December 2024
Summary
In certain versions of Splunk Enterprise and Splunk Cloud Platform, a flaw exists that allows low-privileged users to clone dashboards they should not access due to insufficient access controls. This occurs when a user's name matches that of a role with read access to the dashboard. As a result, these users may inadvertently expose sensitive dashboard names and XML configurations, presenting a potential security risk.
Affected Version(s)
Splunk Cloud Platform 9.1.2312 < 9.1.2312.206
Splunk Enterprise 9.2 < 9.2.4
Splunk Enterprise 9.1 < 9.1.7
References
CVSS V3.1
Score:
3.1
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published