CVE-2024-36997

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit.
Configurations

No configuration.

History

08 Jul 2024, 14:18

Type Values Removed Values Added
CWE CWE-75

02 Jul 2024, 12:09

Type Values Removed Values Added
Summary
  • (es) En las versiones de Splunk Enterprise inferiores a 9.2.2, 9.1.5 y 9.0.10 y en las versiones de Splunk Cloud Platform inferiores a 9.1.2312, un usuario administrador podría almacenar y ejecutar código JavaScript arbitrario en el contexto del navegador de otro usuario de Splunk a través de conf-web/settings endpoint REST. Potencialmente, esto podría provocar un exploit de cross-site scripting (XSS) persistente.

01 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-01 17:15

Updated : 2024-07-08 14:18


NVD link : CVE-2024-36997

Mitre link : CVE-2024-36997

CVE.ORG link : CVE-2024-36997


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-75

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)