We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-29946

Risky command safeguards bypass in Dashboard Examples Hub



Description

In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser.

Reserved 2024-03-21 | Published 2024-03-27 | Updated 2025-02-28 | Assigner Splunk


HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Product status

9.2 before 9.2.1
affected

9.1 before 9.1.4
affected

9.0 before 9.0.9
affected

- before 9.1.2312.104
affected

- before 9.1.2308.205
affected

References

advisory.splunk.com/advisories/SVD-2024-0302

research.splunk.com/...1cf58ae1-9177-40b8-a26c-8966040f11ae/

cve.org (CVE-2024-29946)

nvd.nist.gov (CVE-2024-29946)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-29946

Support options

Helpdesk Chat, Email, Knowledgebase