#VU98541 Path traversal in Splunk Enterprise - CVE-2024-45731
Published: October 15, 2024
Splunk Enterprise
Splunk Inc.
Description
The vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to input validation error when processing filenames. A remote user can write a .dll file to the Windows system root directory, which has a default
location in the Windows System32 folder, and execute it with elevated privileges.
Note, the vulnerability affects Splunk Enterprise for
Windows when installed on a separate drive.