Overview
- Description
- In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.
- Source
- prodsec@splunk.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
CVE-2024-45732 (CVSS:7.1, HIGH) is Undergoing Analysis. In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2...https://t.co/q91obl3RtU #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
برای SPLUNK و محصول Enterprise product آن آسیب پذیری های مختلفی منتشر شده است که به هکرها امکان اجرای کد به صورت Remote را می دهند. از معروفترین این آسیب پذیری ها می توان به CVE-2024-45733 و CVE-2024-45732 و CVE-2024-45731 نام برد. https://t.co/Y2P1U3eX7Y https://t.co/ZWDmLoktwj
@AmirHossein_sec
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1", "versionEndExcluding": "9.2.3", "versionStartIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "11F038B4-1335-4F4E-9013-E6D6152DCD20" }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "557AF53F-284F-43D2-9EA1-2E0E628DC303", "versionEndExcluding": "9.1.2308.208" }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DAA9B36-48A2-45BF-97B9-E548E80DF83C", "versionEndExcluding": "9.1.2312.110", "versionStartIncluding": "9.1.2312.100" }, { "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "200953F8-DF1D-4C6C-BE36-0866700A5F55", "versionEndExcluding": "9.2.2403.103", "versionStartIncluding": "9.2.2403.102" } ], "operator": "OR" } ] } ]