In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with an improperly formatted "INGEST_EVAL" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd).
History

Wed, 16 Oct 2024 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Splunk splunk
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*
Vendors & Products Splunk splunk

Tue, 15 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
CPEs cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*
Vendors & Products Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with an improperly formatted "INGEST_EVAL" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd).
Title Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Splunk

Published: 2024-10-14T17:03:34.828Z

Updated: 2024-10-30T15:06:13.696Z

Reserved: 2024-09-05T21:35:21.290Z

Link: CVE-2024-45736

cve-icon Vulnrichment

Updated: 2024-10-15T16:40:14.294Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T17:15:12.253

Modified: 2024-10-16T22:19:44.507

Link: CVE-2024-45736

cve-icon Redhat

No data.