In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Oct 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-75 |

Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-01-15T17:05:32.922Z
Reserved: 2024-05-30T16:36:20.999Z
Link: CVE-2024-36983

Updated: 2024-08-02T03:43:50.454Z

Status : Awaiting Analysis
Published: 2024-07-01T17:15:06.257
Modified: 2024-11-21T09:22:58.390
Link: CVE-2024-36983

No data.