cve-2024-36983
Vulnerability from cvelistv5
Published
2024-07-01 16:30
Modified
2024-12-10 18:00
Severity ?
EPSS score ?
Summary
Command Injection using External Lookups
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Splunk | Splunk Enterprise |
Version: 9.2 < 9.2.2 Version: 9.1 < 9.1.5 Version: 9.0 < 9.0.10 |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ], "defaultStatus": "unknown", "product": "splunk", "vendor": "splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "splunk_cloud_platform", "vendor": "splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36983", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T20:10:58.843878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:36:43.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:43:50.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisory.splunk.com/advisories/SVD-2024-0703" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.2.2", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.5", "status": "affected", "version": "9.1", "versionType": "custom" }, { "lessThan": "9.0.10", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "9.1.2312.109", "status": "affected", "version": "9.1.2312", "versionType": "custom" }, { "lessThan": "9.1.2308.207", "status": "affected", "version": "9.1.2308", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-07-01T00:00:00.000000", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance." } ], "value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-10T18:00:28.573Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-0703" }, { "url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/" } ], "source": { "advisory": "SVD-2024-0703" }, "title": "Command Injection using External Lookups" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-36983", "datePublished": "2024-07-01T16:30:41.779Z", "dateReserved": "2024-05-30T16:36:20.999Z", "dateUpdated": "2024-12-10T18:00:28.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-36983\",\"sourceIdentifier\":\"prodsec@splunk.com\",\"published\":\"2024-07-01T17:15:06.257\",\"lastModified\":\"2024-11-21T09:22:58.390\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance.\"},{\"lang\":\"es\",\"value\":\"En las versiones de Splunk Enterprise inferiores a 9.2.2, 9.1.5 y 9.0.10 y en las versiones de Splunk Cloud Platform inferiores a 9.1.2312.109 y 9.1.2308.207, un usuario autenticado podr\u00eda crear una b\u00fasqueda externa que llame a una funci\u00f3n interna heredada. El usuario autenticado podr\u00eda utilizar esta funci\u00f3n interna para insertar c\u00f3digo en el directorio de instalaci\u00f3n de la plataforma Splunk. Desde all\u00ed, el usuario podr\u00eda ejecutar c\u00f3digo arbitrario en la instancia de la plataforma Splunk.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.1,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"references\":[{\"url\":\"https://advisory.splunk.com/advisories/SVD-2024-0703\",\"source\":\"prodsec@splunk.com\"},{\"url\":\"https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/\",\"source\":\"prodsec@splunk.com\"},{\"url\":\"https://advisory.splunk.com/advisories/SVD-2024-0703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.