Insufficient Access Control in Splunk Enterprise and Splunk Cloud Platform
CVE-2024-53245

3.1LOW

Key Information:

Vendor
Splunk
Vendor
CVE Published:
10 December 2024

Summary

In certain versions of Splunk Enterprise and Splunk Cloud Platform, a flaw exists that allows low-privileged users to clone dashboards they should not access due to insufficient access controls. This occurs when a user's name matches that of a role with read access to the dashboard. As a result, these users may inadvertently expose sensitive dashboard names and XML configurations, presenting a potential security risk.

Affected Version(s)

Splunk Cloud Platform 9.1.2312 < 9.1.2312.206

Splunk Enterprise 9.2 < 9.2.4

Splunk Enterprise 9.1 < 9.1.7

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.