Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-53246 (GCVE-0-2024-53246)
Vulnerability from cvelistv5 – Published: 2024-12-10 18:01 – Updated: 2025-02-28 11:03- CWE-319 - The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
| Vendor | Product | Version | |
|---|---|---|---|
| Splunk | Splunk Enterprise |
Affected:
9.3 , < 9.3.2
(custom)
Affected: 9.2 , < 9.2.4 (custom) Affected: 9.1 , < 9.1.7 (custom) |
|
| Splunk | Splunk Cloud Platform |
Affected:
9.3.2408 , < 9.3.2408.101
(custom)
Affected: 9.2.2406 , < 9.2.2406.106 (custom) Affected: 9.2.2403 , < 9.2.2403.111 (custom) Affected: 9.1.2312 , < 9.1.2312.206 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53246",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-10T20:39:36.685783Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-10T21:13:47.167Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Splunk Enterprise",
"vendor": "Splunk",
"versions": [
{
"lessThan": "9.3.2",
"status": "affected",
"version": "9.3",
"versionType": "custom"
},
{
"lessThan": "9.2.4",
"status": "affected",
"version": "9.2",
"versionType": "custom"
},
{
"lessThan": "9.1.7",
"status": "affected",
"version": "9.1",
"versionType": "custom"
}
]
},
{
"product": "Splunk Cloud Platform",
"vendor": "Splunk",
"versions": [
{
"lessThan": "9.3.2408.101",
"status": "affected",
"version": "9.3.2408",
"versionType": "custom"
},
{
"lessThan": "9.2.2406.106",
"status": "affected",
"version": "9.2.2406",
"versionType": "custom"
},
{
"lessThan": "9.2.2403.111",
"status": "affected",
"version": "9.2.2403",
"versionType": "custom"
},
{
"lessThan": "9.1.2312.206",
"status": "affected",
"version": "9.1.2312",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-12-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation."
}
],
"value": "In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-319",
"description": "The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-28T11:03:55.865Z",
"orgId": "42b59230-ec95-491e-8425-5a5befa1a469",
"shortName": "Splunk"
},
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
}
],
"source": {
"advisory": "SVD-2024-1204"
},
"title": "Sensitive Information Disclosure through SPL commands"
}
},
"cveMetadata": {
"assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469",
"assignerShortName": "Splunk",
"cveId": "CVE-2024-53246",
"datePublished": "2024-12-10T18:01:16.803Z",
"dateReserved": "2024-11-19T18:30:28.773Z",
"dateUpdated": "2025-02-28T11:03:55.865Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-53246",
"date": "2026-05-19",
"epss": "0.00074",
"percentile": "0.22236"
},
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.\"}, {\"lang\": \"es\", \"value\": \"En las versiones de Splunk Enterprise anteriores a 9.3.2, 9.2.4 y 9.1.7 y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.101, 9.2.2406.106, 9.2.2403.111 y 9.1.2312.206, un comando SPL puede revelar informaci\\u00f3n confidencial. La vulnerabilidad requiere la explotaci\\u00f3n de otra vulnerabilidad, como Risky Commands Bypass, para una explotaci\\u00f3n exitosa.\"}]",
"id": "CVE-2024-53246",
"lastModified": "2024-12-10T18:15:41.553",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"prodsec@splunk.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}]}",
"published": "2024-12-10T18:15:41.553",
"references": "[{\"url\": \"https://advisory.splunk.com/advisories/SVD-2024-1204\", \"source\": \"prodsec@splunk.com\"}]",
"sourceIdentifier": "prodsec@splunk.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"prodsec@splunk.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-319\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-53246\",\"sourceIdentifier\":\"prodsec@splunk.com\",\"published\":\"2024-12-10T18:15:41.553\",\"lastModified\":\"2025-03-10T16:41:47.730\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.\"},{\"lang\":\"es\",\"value\":\"En las versiones de Splunk Enterprise anteriores a 9.3.2, 9.2.4 y 9.1.7 y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.101, 9.2.2406.106, 9.2.2403.111 y 9.1.2312.206, un comando SPL puede revelar informaci\u00f3n confidencial. La vulnerabilidad requiere la explotaci\u00f3n de otra vulnerabilidad, como Risky Commands Bypass, para una explotaci\u00f3n exitosa.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"9.1.0\",\"versionEndExcluding\":\"9.1.7\",\"matchCriteriaId\":\"6653C37D-03C0-47C1-BC9C-510EBB0CB4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"9.2.0\",\"versionEndExcluding\":\"9.2.4\",\"matchCriteriaId\":\"E31DE8DF-1AAD-4570-93E3-711C07FE1227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"9.3.0\",\"versionEndExcluding\":\"9.3.2\",\"matchCriteriaId\":\"A709D871-A35B-4CF2-A9D7-23CE29D0A8C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.1.2312\",\"versionEndExcluding\":\"9.1.2312.206\",\"matchCriteriaId\":\"C0338CF9-1AC9-4F45-9A68-06172C6B36A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.2.2403\",\"versionEndExcluding\":\"9.2.2403.111\",\"matchCriteriaId\":\"4A95FCF8-8741-4577-8A0D-BDE7DCC1B720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.2.2406\",\"versionEndExcluding\":\"9.2.2406.106\",\"matchCriteriaId\":\"62C1B5C7-2523-464D-9114-5C9F07AAEE9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.3.2408\",\"versionEndExcluding\":\"9.3.2408.101\",\"matchCriteriaId\":\"9AF2CBAC-EF5D-4E0A-8B8D-900583D44876\"}]}]}],\"references\":[{\"url\":\"https://advisory.splunk.com/advisories/SVD-2024-1204\",\"source\":\"prodsec@splunk.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53246\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-10T20:39:36.685783Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-10T20:40:38.626Z\"}}], \"cna\": {\"title\": \"Sensitive Information Disclosure through SPL commands\", \"source\": {\"advisory\": \"SVD-2024-1204\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Splunk\", \"product\": \"Splunk Enterprise\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.3\", \"lessThan\": \"9.3.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.2\", \"lessThan\": \"9.2.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.1\", \"lessThan\": \"9.1.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Splunk\", \"product\": \"Splunk Cloud Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.3.2408\", \"lessThan\": \"9.3.2408.101\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.2.2406\", \"lessThan\": \"9.2.2406.106\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.2.2403\", \"lessThan\": \"9.2.2403.111\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.1.2312\", \"lessThan\": \"9.1.2312.206\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2024-12-10T00:00:00.000Z\", \"references\": [{\"url\": \"https://advisory.splunk.com/advisories/SVD-2024-1204\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-319\", \"description\": \"The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.\"}]}], \"providerMetadata\": {\"orgId\": \"42b59230-ec95-491e-8425-5a5befa1a469\", \"shortName\": \"Splunk\", \"dateUpdated\": \"2025-02-28T11:03:55.865Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-53246\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-28T11:03:55.865Z\", \"dateReserved\": \"2024-11-19T18:30:28.773Z\", \"assignerOrgId\": \"42b59230-ec95-491e-8425-5a5befa1a469\", \"datePublished\": \"2024-12-10T18:01:16.803Z\", \"assignerShortName\": \"Splunk\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-1061
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Splunk Universal Forwarders versions 9.1.x antérieures à 9.1.7 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarders versions 9.2.x antérieures à 9.2.4 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarders versions 9.3.x antérieures à 9.3.2 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406.x antérieures à 9.2.2406.107 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.4 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.8.x antérieures à 3.8.5 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.111 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.7 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.2 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.4.x antérieures à 3.4.262 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408.x antérieures à 9.3.2408.101 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.7.x antérieures à 3.7.18 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.206 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Universal Forwarders versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarders versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarders versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.107",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.5",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.111",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.4.x ant\u00e9rieures \u00e0 3.4.262",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.101",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.18",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.206",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
},
{
"name": "CVE-2024-53245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53245"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53247"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-53244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53244"
},
{
"name": "CVE-2024-53243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53243"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-36129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36129"
},
{
"name": "CVE-2021-44531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
},
{
"name": "CVE-2024-53246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53246"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1061",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1204",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1201",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1201"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1203",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1203"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1207",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1207"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1206",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1206"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1205",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1205"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1202",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1202"
}
]
}
CERTFR-2024-AVI-1061
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Splunk Universal Forwarders versions 9.1.x antérieures à 9.1.7 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarders versions 9.2.x antérieures à 9.2.4 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarders versions 9.3.x antérieures à 9.3.2 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406.x antérieures à 9.2.2406.107 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.4 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.8.x antérieures à 3.8.5 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.111 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.7 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.2 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.4.x antérieures à 3.4.262 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408.x antérieures à 9.3.2408.101 | ||
| Splunk | Splunk Secure Gateway | Splunk Secure Gateway versions 3.7.x antérieures à 3.7.18 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.206 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Universal Forwarders versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarders versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarders versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.107",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.5",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.111",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.4.x ant\u00e9rieures \u00e0 3.4.262",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.101",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.18",
"product": {
"name": "Splunk Secure Gateway",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.206",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
},
{
"name": "CVE-2024-53245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53245"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53247"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-53244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53244"
},
{
"name": "CVE-2024-53243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53243"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-36129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36129"
},
{
"name": "CVE-2021-44531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
},
{
"name": "CVE-2024-53246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53246"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1061",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1204",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1201",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1201"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1203",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1203"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1207",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1207"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1206",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1206"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1205",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1205"
},
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1202",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1202"
}
]
}
BDU:2024-11494
Vulnerability from fstec - Published: 19.11.2024{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Splunk Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 9.3.0 \u0434\u043e 9.3.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Splunk Enterprise), \u043e\u0442 9.2.0 \u0434\u043e 9.2.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Splunk Enterprise), \u043e\u0442 9.1.0 \u0434\u043e 9.1.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Splunk Enterprise), \u0434\u043e 9.3.2408.101 (Splunk Cloud Platform), \u0434\u043e 9.2.2406.106 (Splunk Cloud Platform), \u0434\u043e 9.2.2403.111 (Splunk Cloud Platform), \u0434\u043e 9.1.2312.206 (Splunk Cloud Platform)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://advisory.splunk.com/advisories/SVD-2024-1204",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "19.11.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.12.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.12.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-11494",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-53246",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Splunk Enterprise, Splunk Cloud Platform",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b \u0434\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 Splunk Enterprise, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0435\u0440\u0435\u0434\u0430\u0447\u0430 \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 \u0432\u0438\u0434\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u0442\u0435\u043a\u0441\u0442\u0430 (CWE-319)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b \u0434\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 Splunk Enterprise \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://advisory.splunk.com/advisories/SVD-2024-1204",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-319",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
FKIE_CVE-2024-53246
Vulnerability from fkie_nvd - Published: 2024-12-10 18:15 - Updated: 2025-03-10 16:417.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| prodsec@splunk.com | https://advisory.splunk.com/advisories/SVD-2024-1204 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| splunk | splunk | * | |
| splunk | splunk | * | |
| splunk | splunk | * | |
| splunk | splunk_cloud_platform | * | |
| splunk | splunk_cloud_platform | * | |
| splunk | splunk_cloud_platform | * | |
| splunk | splunk_cloud_platform | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "6653C37D-03C0-47C1-BC9C-510EBB0CB4BE",
"versionEndExcluding": "9.1.7",
"versionStartIncluding": "9.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "E31DE8DF-1AAD-4570-93E3-711C07FE1227",
"versionEndExcluding": "9.2.4",
"versionStartIncluding": "9.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A709D871-A35B-4CF2-A9D7-23CE29D0A8C6",
"versionEndExcluding": "9.3.2",
"versionStartIncluding": "9.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0338CF9-1AC9-4F45-9A68-06172C6B36A1",
"versionEndExcluding": "9.1.2312.206",
"versionStartIncluding": "9.1.2312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A95FCF8-8741-4577-8A0D-BDE7DCC1B720",
"versionEndExcluding": "9.2.2403.111",
"versionStartIncluding": "9.2.2403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62C1B5C7-2523-464D-9114-5C9F07AAEE9F",
"versionEndExcluding": "9.2.2406.106",
"versionStartIncluding": "9.2.2406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF2CBAC-EF5D-4E0A-8B8D-900583D44876",
"versionEndExcluding": "9.3.2408.101",
"versionStartIncluding": "9.3.2408",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation."
},
{
"lang": "es",
"value": "En las versiones de Splunk Enterprise anteriores a 9.3.2, 9.2.4 y 9.1.7 y en las versiones de Splunk Cloud Platform anteriores a 9.3.2408.101, 9.2.2406.106, 9.2.2403.111 y 9.1.2312.206, un comando SPL puede revelar informaci\u00f3n confidencial. La vulnerabilidad requiere la explotaci\u00f3n de otra vulnerabilidad, como Risky Commands Bypass, para una explotaci\u00f3n exitosa."
}
],
"id": "CVE-2024-53246",
"lastModified": "2025-03-10T16:41:47.730",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "prodsec@splunk.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-12-10T18:15:41.553",
"references": [
{
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
}
],
"sourceIdentifier": "prodsec@splunk.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-319"
}
],
"source": "prodsec@splunk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-319"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-99F4-87G4-QW2H
Vulnerability from github – Published: 2024-12-10 18:31 – Updated: 2024-12-10 18:31In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.
{
"affected": [],
"aliases": [
"CVE-2024-53246"
],
"database_specific": {
"cwe_ids": [
"CWE-319"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-10T18:15:41Z",
"severity": "MODERATE"
},
"details": "In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation.",
"id": "GHSA-99f4-87g4-qw2h",
"modified": "2024-12-10T18:31:07Z",
"published": "2024-12-10T18:31:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53246"
},
{
"type": "WEB",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-3674
Vulnerability from csaf_certbund - Published: 2024-12-10 23:00 - Updated: 2024-12-10 23:00In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuführen oder nicht spezifizierte Auswirkungen zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen einer unsachgemäßen Zugriffskontrolle in den Endpunkten der Key Value Store (KVstore)-Sammlungen in der Secure Gateway App. Ein entfernter, authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen zu Suchanfragen für Alarme anzuzeigen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen der unsachgemäßen Handhabung von Berechtigungen im Berichtsendpunkt in der Cloud-Plattform. Indem er einen Benutzer mit höheren Rechten dazu bringt, eine Anfrage in seinem Browser zu initiieren, kann ein entfernter, authentifizierter Angreifer diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen und gespeicherte Suchen mit beliebigen Befehlen auszuführen. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen unsachgemäßer Zugriffskontrolle in der Komponente zum Klonen von Dashboards in der Cloud Platform. Ein entfernter authentifizierter Angreifer mit einem Benutzerkonto mit geringen Rechten, das denselben Namen wie eine Rolle mit Lesezugriff auf ein Dashboard hat, kann diese Schwachstelle ausnutzen, um den Dashboard-Namen und die XML-Konfiguration durch Klonen des Dashboards anzuzeigen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
Dieser Fehler existiert wegen der unsachgemäßen Behandlung von SPL-Befehlen in der Suchverarbeitungskomponente in der Cloud-Plattform. Ein entfernter, anonymer Angreifer kann diese Schwachstelle in Kombination mit anderen Schwachstellen ausnutzen, um Zugang zu sensiblen Informationen zu erhalten. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen einer unsicheren Deserialisierung von Daten in der jsonpickle Python-Bibliothek, die von der Secure Gateway-Anwendung verwendet wird. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Splunk Splunk Enterprise <9.1.7
Splunk / Splunk Enterprise
|
<9.1.7 | ||
|
Splunk Splunk Enterprise <9.2.4
Splunk / Splunk Enterprise
|
<9.2.4 | ||
|
Splunk Splunk Enterprise <9.3.2
Splunk / Splunk Enterprise
|
<9.3.2 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder unspezifische Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3674 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3674.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3674 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3674"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1201 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1201"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1202 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1202"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1203 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1203"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1204 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1205 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1205"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1206 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1206"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1207 vom 2024-12-10",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1207"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-10T23:00:00.000+00:00",
"generator": {
"date": "2024-12-11T12:11:56.562+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3674",
"initial_release_date": "2024-12-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.3.2",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.2",
"product_id": "T039778"
}
},
{
"category": "product_version",
"name": "9.3.2",
"product": {
"name": "Splunk Splunk Enterprise 9.3.2",
"product_id": "T039778-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.4",
"product_id": "T039779"
}
},
{
"category": "product_version",
"name": "9.2.4",
"product": {
"name": "Splunk Splunk Enterprise 9.2.4",
"product_id": "T039779-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.7",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.7",
"product_id": "T039780"
}
},
{
"category": "product_version",
"name": "9.1.7",
"product": {
"name": "Splunk Splunk Enterprise 9.1.7",
"product_id": "T039780-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.7"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2024-25710",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-36114",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-36129",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-36129"
},
{
"cve": "CVE-2024-4067",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-4067"
},
{
"cve": "CVE-2024-42459",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-42459"
},
{
"cve": "CVE-2024-42460",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-42460"
},
{
"cve": "CVE-2024-42461",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-42461"
},
{
"cve": "CVE-2024-45296",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6531",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-6531"
},
{
"cve": "CVE-2024-53243",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen einer unsachgem\u00e4\u00dfen Zugriffskontrolle in den Endpunkten der Key Value Store (KVstore)-Sammlungen in der Secure Gateway App. Ein entfernter, authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen zu Suchanfragen f\u00fcr Alarme anzuzeigen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53243"
},
{
"cve": "CVE-2024-53244",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen der unsachgem\u00e4\u00dfen Handhabung von Berechtigungen im Berichtsendpunkt in der Cloud-Plattform. Indem er einen Benutzer mit h\u00f6heren Rechten dazu bringt, eine Anfrage in seinem Browser zu initiieren, kann ein entfernter, authentifizierter Angreifer diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen und gespeicherte Suchen mit beliebigen Befehlen auszuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53244"
},
{
"cve": "CVE-2024-53245",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen unsachgem\u00e4\u00dfer Zugriffskontrolle in der Komponente zum Klonen von Dashboards in der Cloud Platform. Ein entfernter authentifizierter Angreifer mit einem Benutzerkonto mit geringen Rechten, das denselben Namen wie eine Rolle mit Lesezugriff auf ein Dashboard hat, kann diese Schwachstelle ausnutzen, um den Dashboard-Namen und die XML-Konfiguration durch Klonen des Dashboards anzuzeigen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53245"
},
{
"cve": "CVE-2024-53246",
"notes": [
{
"category": "description",
"text": "Dieser Fehler existiert wegen der unsachgem\u00e4\u00dfen Behandlung von SPL-Befehlen in der Suchverarbeitungskomponente in der Cloud-Plattform. Ein entfernter, anonymer Angreifer kann diese Schwachstelle in Kombination mit anderen Schwachstellen ausnutzen, um Zugang zu sensiblen Informationen zu erhalten. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53246"
},
{
"cve": "CVE-2024-53247",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen einer unsicheren Deserialisierung von Daten in der jsonpickle Python-Bibliothek, die von der Secure Gateway-Anwendung verwendet wird. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53247"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.