Home

Description

In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser.

PUBLISHED Reserved 2024-03-21 | Published 2024-03-27 | Updated 2025-02-28 | Assigner Splunk




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Product status

9.2 (custom) before 9.2.1
affected

9.1 (custom) before 9.1.4
affected

9.0 (custom) before 9.0.9
affected

- (custom) before 9.1.2312.104
affected

- (custom) before 9.1.2308.205
affected

References

advisory.splunk.com/advisories/SVD-2024-0302

research.splunk.com/...1cf58ae1-9177-40b8-a26c-8966040f11ae/

advisory.splunk.com/advisories/SVD-2024-0302

research.splunk.com/...1cf58ae1-9177-40b8-a26c-8966040f11ae/

cve.org (CVE-2024-29946)

nvd.nist.gov (CVE-2024-29946)

Download JSON