First published: Mon Jan 22 2024(Updated: )
In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Cloud Platform | <9.1.2308.200 | |
Splunk | >=9.0.0<9.0.8 | |
Splunk | >=9.1.0<9.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23676 is rated as a medium severity vulnerability.
To fix CVE-2024-23676, upgrade Splunk to version 9.0.8 or 9.1.3 or later.
CVE-2024-23676 affects Splunk versions below 9.0.8 and 9.1.3.
CVE-2024-23676 is an authorization bypass vulnerability.
Yes, CVE-2024-23676 requires user interaction from a high-privileged user to be exploited.