CVE-2024-45737Cross-Site Request Forgery in Cloud Platform

Severity
3.5LOWNVD
CNA4.3
EPSS
0.0%
top 92.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 14

Description

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:LExploitability: 2.1 | Impact: 1.4

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform9.2.24039.2.2403.108+1
NVDsplunk/splunk_cloud_platform9.1.23129.1.2312.204+1
CVEListV5splunk/splunk_enterprise9.39.3.1+2
NVDsplunk/splunk9.1.09.1.6+2

🔴Vulnerability Details

2
CVEList
Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)2024-10-14
GHSA
GHSA-3pc3-p9j7-xvq6: In Splunk Enterprise versions below 92024-10-14
CVE-2024-45737 — Cross-Site Request Forgery in Splunk | cvebase