In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom configuration file that the "api.uri" parameter from the "/manager/search/apps/local" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-1011 | Vendor Advisory |
https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-14 17:15
Updated : 2024-10-17 13:12
NVD link : CVE-2024-45741
Mitre link : CVE-2024-45741
CVE.ORG link : CVE-2024-45741
JSON object : View
Products Affected
splunk
- splunk_cloud_platform
- splunk
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')