CVE-2024-45741

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom configuration file that the "api.uri" parameter from the "/manager/search/apps/local" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*

History

17 Oct 2024, 13:12

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Splunk
Splunk splunk
Splunk splunk Cloud Platform
CWE CWE-79
References () https://advisory.splunk.com/advisories/SVD-2024-1011 - () https://advisory.splunk.com/advisories/SVD-2024-1011 - Vendor Advisory
References () https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/ - () https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/ - Third Party Advisory
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*

14 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-14 17:15

Updated : 2024-10-17 13:12


NVD link : CVE-2024-45741

Mitre link : CVE-2024-45741


JSON object : View

Products Affected

splunk

  • splunk
  • splunk_cloud_platform
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')