Description
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36374 | In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will. |
References
History
No history.
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:54.414Z
Reserved: 2024-05-30T16:36:21.000Z
Link: CVE-2024-36986
Updated: 2024-08-02T03:43:50.752Z
Status : Modified
Published: 2024-07-01T17:15:06.910
Modified: 2024-11-21T09:22:58.763
Link: CVE-2024-36986
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD