Vulnerability Description
In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a malicious payload through a custom configuration file that the "api.uri" parameter from the "/manager/search/apps/local" endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk | >= 9.1.0, < 9.1.6 |
| Splunk | Splunk Cloud Platform | >= 9.1.2312, < 9.1.2312.205 |
Related Weaknesses (CWE)
References
- https://advisory.splunk.com/advisories/SVD-2024-1011Vendor Advisory
- https://research.splunk.com/application/d7b5aa71-157f-4359-9c34-e35752b1d0a2/Third Party Advisory
FAQ
What is CVE-2024-45741?
CVE-2024-45741 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the "admin" or "power" Splunk roles...
How severe is CVE-2024-45741?
CVE-2024-45741 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-45741?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Splunk, Splunk Splunk Cloud Platform.