Логотип exploitDog
bind:CVE-2024-36986
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-36986

Количество 3

Количество 3

nvd логотип

CVE-2024-36986

больше 1 года назад

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-xgxh-897r-pw22

больше 1 года назад

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-05273

больше 1 года назад

Уязвимость модуля Analytics Workspace веб-интерфейса Splunk Web платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-36986

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

CVSS3: 6.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-xgxh-897r-pw22

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

CVSS3: 6.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05273

Уязвимость модуля Analytics Workspace веб-интерфейса Splunk Web платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды

CVSS3: 6.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу