First published: Mon Oct 14 2024(Updated: )
In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through Scheduled Views that could result in execution of unauthorized JavaScript code in the browser of a user.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | >=9.1.0<9.1.6 | |
Splunk | >=9.2.0<9.2.3 | |
Splunk Cloud Platform | <9.2.2403.100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45740 is classified as a low severity vulnerability affecting certain versions of Splunk Enterprise and Splunk Cloud Platform.
To remediate CVE-2024-45740, upgrade to Splunk Enterprise version 9.2.3 or 9.1.6 or Splunk Cloud Platform version 9.2.2403 or later.
CVE-2024-45740 affects low-privileged users in Splunk who do not have admin or power roles, on specific versions of Splunk products.
Exploitation of CVE-2024-45740 could allow unauthorized execution of commands by crafting malicious payloads through Scheduled Views.
Vulnerable versions include Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Cloud Platform versions below 9.2.2403.