First published: Mon Jul 01 2024(Updated: )
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Splunk Splunk | >=9.0.0<9.0.10 | |
Splunk Splunk | >=9.1.0<9.1.5 | |
Splunk Splunk | >=9.2.0<9.2.2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36991 is considered a high severity vulnerability due to the potential for unauthorized access through path traversal.
To fix CVE-2024-36991, upgrade your Splunk Enterprise software to version 9.2.2 or later, or to 9.1.5 or later if you are on version 9.1.x, or to 9.0.10 or later if you are on version 9.0.x.
CVE-2024-36991 affects Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 specifically on Windows.
Yes, CVE-2024-36991 can potentially be exploited remotely if an attacker targets the vulnerable /modules/messaging/ endpoint.
CVE-2024-36991 is specific to Splunk Enterprise running on Windows operating systems.