Home

Description

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint.

PUBLISHED Reserved 2024-05-30 | Published 2024-07-01 | Updated 2025-02-28 | Assigner Splunk




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

Product status

9.2 (custom) before 9.2.2
affected

9.1 (custom) before 9.1.5
affected

9.0 (custom) before 9.0.10
affected

9.1.2312 (custom) before 9.1.2312.200
affected

Credits

Kyle Bambrick, Splunk

References

advisory.splunk.com/advisories/SVD-2024-0707

advisory.splunk.com/advisories/SVD-2024-0707

cve.org (CVE-2024-36987)

nvd.nist.gov (CVE-2024-36987)

Download JSON