In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom configuration file that the "api.uri" parameter from the "/manager/search/apps/local" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-1011 | Vendor Advisory |
https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Oct 2024, 13:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisory.splunk.com/advisories/SVD-2024-1011 - Vendor Advisory | |
References | () https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/ - Third Party Advisory | |
CPE | cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* |
|
First Time |
Splunk splunk
Splunk Splunk splunk Cloud Platform |
15 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-14 17:15
Updated : 2024-10-17 13:12
NVD link : CVE-2024-45741
Mitre link : CVE-2024-45741
CVE.ORG link : CVE-2024-45741
JSON object : View
Products Affected
splunk
- splunk_cloud_platform
- splunk
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')