CVE-2024-45731Relative Path Traversal in Enterprise

Severity
8.0HIGHNVD
EPSS
0.6%
top 30.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 14

Description

In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages2 packages

CVEListV5splunk/splunk_enterprise9.39.3.1+2
NVDsplunk/splunk9.1.09.1.6+2

🔴Vulnerability Details

2
CVEList
Potential Remote Command Execution (RCE) through arbitrary file write to Windows system root directory when Splunk Enterprise for Windows is installed on a separate disk2024-10-14
GHSA
GHSA-j6xh-hx47-7x23: In Splunk Enterprise for Windows versions below 92024-10-14
CVE-2024-45731 — Relative Path Traversal in Splunk | cvebase