CVE-2024-29946
Risky command safeguards bypass in Dashboard Examples Hub
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser.
En las versiones de Splunk Enterprise inferiores a 9.2.1, 9.1.4 y 9.0.9, el Centro de ejemplos de paneles de la aplicación Splunk Dashboard Studio carece de protección para comandos SPL riesgosos. Esto podría permitir a los atacantes eludir las salvaguardas de SPL para comandos riesgosos en el Hub. La vulnerabilidad requeriría que el atacante realice phishing a la víctima engañándola para que inicie una solicitud dentro de su navegador.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-03-21 CVE Reserved
- 2024-03-27 CVE Published
- 2024-05-06 EPSS Updated
- 2024-10-30 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://advisory.splunk.com/advisories/SVD-2024-0302 | 2024-04-10 | |
https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae | 2024-04-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 9.0.0 < 9.0.9 Search vendor "Splunk" for product "Splunk" and version " >= 9.0.0 < 9.0.9" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 9.1.0 < 9.1.4 Search vendor "Splunk" for product "Splunk" and version " >= 9.1.0 < 9.1.4" | enterprise |
Affected
| ||||||
Splunk Search vendor "Splunk" | Splunk Search vendor "Splunk" for product "Splunk" | >= 9.2.0 < 9.2.1 Search vendor "Splunk" for product "Splunk" and version " >= 9.2.0 < 9.2.1" | enterprise |
Affected
|