CVE-2024-45736Uncontrolled Resource Consumption in Cloud Platform

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 64.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 14

Description

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with an improperly formatted "INGEST_EVAL" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform9.2.24039.2.2403.107+2
NVDsplunk/splunk_cloud_platform9.1.23129.1.2312.111+2
CVEListV5splunk/splunk_enterprise9.39.3.1+2
NVDsplunk/splunk9.1.09.1.6+2

🔴Vulnerability Details

2
GHSA
GHSA-wf7c-j44x-2379: In Splunk Enterprise versions below 92024-10-14
CVEList
Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon2024-10-14
CVE-2024-45736 — Uncontrolled Resource Consumption | cvebase