Lucene search

K
vulnrichmentSplunkVULNRICHMENT:CVE-2024-36983
HistoryJul 01, 2024 - 4:30 p.m.

CVE-2024-36983 Command Injection using External Lookups

2024-07-0116:30:41
Splunk
github.com
cve-2024-36983
command injection
splunk enterprise
splunk cloud
authenticated user
legacy internal function
unauthorized code execution

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.

CNA Affected

[
  {
    "vendor": "Splunk",
    "product": "Splunk Enterprise",
    "versions": [
      {
        "status": "affected",
        "version": "9.2",
        "lessThan": "9.2.2",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "9.1",
        "lessThan": "9.1.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "9.0",
        "lessThan": "9.0.10",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Splunk",
    "product": "Splunk Cloud Platform",
    "versions": [
      {
        "status": "affected",
        "version": "9.1.2312",
        "lessThan": "9.1.2312.109",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "9.1.2308",
        "lessThan": "9.1.2308.207",
        "versionType": "custom"
      }
    ]
  }
]

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

Related for VULNRICHMENT:CVE-2024-36983