In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-0703 | Vendor Advisory |
https://advisory.splunk.com/advisories/SVD-2024-0703 | Vendor Advisory |
https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ | Tool Signature |
https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ | Tool Signature |
Configurations
Configuration 1 (hide)
|
History
07 Mar 2025, 16:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-77 | |
First Time |
Splunk
Splunk splunk Cloud Platform Splunk splunk |
|
References | () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - Tool Signature | |
References | () https://advisory.splunk.com/advisories/SVD-2024-0703 - Vendor Advisory |
01 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-01 17:15
Updated : 2025-03-07 17:13
NVD link : CVE-2024-36983
Mitre link : CVE-2024-36983
JSON object : View
Products Affected
splunk
- splunk
- splunk_cloud_platform
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')