#VU98537 Improper access control in Splunk Enterprise - CVE-2024-45734


Vulnerability identifier: #VU98537

Vulnerability risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45734

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Splunk Enterprise
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor: Splunk Inc.

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Splunk Enterprise: 9.0.0 - 9.0.10, 9.1.0 - 9.1.5, 9.2.0 - 9.2.2


External links
https://advisory.splunk.com/advisories/SVD-2024-1004
https://research.splunk.com/application/7464e2dc-98a5-4af9-87a1-fa6d5a256fa6/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability