CVE-2024-36986Sensitive Information Exposure in Cloud Platform

Severity
5.7MEDIUMNVD
CNA6.3
EPSS
0.3%
top 47.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 1

Description

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulner

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:NExploitability: 2.1 | Impact: 3.6

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform9.1.23129.1.2312.200+1
NVDsplunk/cloud9.1.23089.1.2308.207+1
CVEListV5splunk/splunk_enterprise9.29.2.2+2
NVDsplunk/splunk9.0.09.0.10+2

🔴Vulnerability Details

2
GHSA
GHSA-xgxh-897r-pw22: In Splunk Enterprise versions below 92024-07-01
CVEList
Risky command safeguards bypass through Search ID query in Analytics Workspace2024-07-01
CVE-2024-36986 — Sensitive Information Exposure | cvebase