In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-0703 | Vendor Advisory |
https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ | Tool Signature |
https://advisory.splunk.com/advisories/SVD-2024-0703 | Vendor Advisory |
https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ | Tool Signature |
Configurations
Configuration 1 (hide)
|
History
07 Mar 2025, 16:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* |
|
First Time |
Splunk splunk Cloud Platform
Splunk Splunk splunk |
|
References | () https://advisory.splunk.com/advisories/SVD-2024-0703 - Vendor Advisory | |
References | () https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ - Tool Signature |
Information
Published : 2024-07-01 17:15
Updated : 2025-03-07 16:48
NVD link : CVE-2024-36983
Mitre link : CVE-2024-36983
CVE.ORG link : CVE-2024-36983
JSON object : View
Products Affected
splunk
- splunk_cloud_platform
- splunk
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')