cve/2024/CVE-2024-36986.md
2025-09-29 21:09:30 +02:00

23 lines
1.6 KiB
Markdown

### [CVE-2024-36986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36986)
![](https://img.shields.io/static/v1?label=Product&message=Splunk%20Cloud%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Splunk%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=9.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.1.2308%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.1.2312%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.&color=brightgreen)
### Description
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
### POC
#### Reference
- https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds