In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-1205 |
Configurations
No configuration.
History
02 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE). |
10 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-10 18:15
Updated : 2025-01-02 18:15
NVD link : CVE-2024-53247
Mitre link : CVE-2024-53247
CVE.ORG link : CVE-2024-53247
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data