mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
116 lines
4.6 KiB
JSON
116 lines
4.6 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-36983",
|
|
"ASSIGNER": "prodsec@splunk.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.",
|
|
"cweId": "CWE-77"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Splunk",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Splunk Enterprise",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.2",
|
|
"version_value": "9.2.2"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1",
|
|
"version_value": "9.1.5"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.0",
|
|
"version_value": "9.0.10"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Splunk Cloud Platform",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1.2312",
|
|
"version_value": "9.1.2312.109"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9.1.2308",
|
|
"version_value": "9.1.2308.207"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703",
|
|
"refsource": "MISC",
|
|
"name": "https://advisory.splunk.com/advisories/SVD-2024-0703"
|
|
},
|
|
{
|
|
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
|
"refsource": "MISC",
|
|
"name": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "SVD-2024-0703"
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Danylo Dmytriiev (DDV_UA)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"version": "3.1",
|
|
"baseScore": 8,
|
|
"baseSeverity": "HIGH"
|
|
}
|
|
]
|
|
}
|
|
} |