In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36374 In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Splunk

Published:

Updated: 2025-02-28T11:03:54.414Z

Reserved: 2024-05-30T16:36:21.000Z

Link: CVE-2024-36986

cve-icon Vulnrichment

Updated: 2024-08-02T03:43:50.752Z

cve-icon NVD

Status : Modified

Published: 2024-07-01T17:15:06.910

Modified: 2024-11-21T09:22:58.763

Link: CVE-2024-36986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.