Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mr5p-hhp7-5qgx

Опубликовано: 01 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.7

Описание

In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the dataset.command parameter of the /app/search/table endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user.

In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the dataset.command parameter of the /app/search/table endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user.

EPSS

Процентиль: 21%
0.00066
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 5.7
nvd
4 месяца назад

In Splunk Enterprise versions below 9.4.4, 9.3.6 and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.109, 9.3.2408.119 and 9.2.2406.122, a low-privileged user that does not hold the 'admin' or 'power' Splunk roles could craft a malicious payload through the `dataset.command` parameter of the `/app/search/table` endpoint, which could result in execution of unauthorized JavaScript code in the browser of a user.

CVSS3: 5.7
fstec
4 месяца назад

Уязвимость веб-интерфейса Splunk Web платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю выполнить произвольный JavaScript-код

EPSS

Процентиль: 21%
0.00066
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-79