Lucene search

K
vulnrichmentSplunkVULNRICHMENT:CVE-2024-36987
HistoryJul 01, 2024 - 4:30 p.m.

CVE-2024-36987 Insecure File Upload in the indexing/preview REST endpoint

2024-07-0116:30:36
Splunk
github.com
cve-2024-36987
insecure file upload
splunk enterprise
splunk cloud platform
rest endpoint.

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

7.1 High

AI Score

Confidence

High

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint.

CNA Affected

[
  {
    "vendor": "Splunk",
    "product": "Splunk Enterprise",
    "versions": [
      {
        "status": "affected",
        "version": "9.2",
        "lessThan": "9.2.2",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "9.1",
        "lessThan": "9.1.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "9.0",
        "lessThan": "9.0.10",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Splunk",
    "product": "Splunk Cloud Platform",
    "versions": [
      {
        "status": "affected",
        "version": "9.1.2312",
        "lessThan": "9.1.2312.200",
        "versionType": "custom"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

7.1 High

AI Score

Confidence

High

Related for VULNRICHMENT:CVE-2024-36987