In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with an improperly formatted "INGEST_EVAL" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd).
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Splunk splunk
|
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:* |
|
Vendors & Products |
Splunk splunk
|
Tue, 15 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Splunk
Splunk splunk Cloud Platform Splunk splunk Enterprise |
|
CPEs | cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Splunk
Splunk splunk Cloud Platform Splunk splunk Enterprise |
|
Metrics |
ssvc
|
Mon, 14 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a search query with an improperly formatted "INGEST_EVAL" parameter as part of a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) which could crash the Splunk daemon (splunkd). | |
Title | Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-01-15T17:05:39.603Z
Reserved: 2024-09-05T21:35:21.290Z
Link: CVE-2024-45736

Updated: 2024-10-15T16:40:14.294Z

Status : Analyzed
Published: 2024-10-14T17:15:12.253
Modified: 2024-10-16T22:19:44.507
Link: CVE-2024-45736

No data.