Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36371 | In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance. |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-75 |
Tue, 15 Oct 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-75 |
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:59.649Z
Reserved: 2024-05-30T16:36:20.999Z
Link: CVE-2024-36983
Updated: 2024-08-02T03:43:50.454Z
Status : Analyzed
Published: 2024-07-01T17:15:06.257
Modified: 2025-03-07T16:48:11.150
Link: CVE-2024-36983
No data.
OpenCVE Enrichment
No data.
EUVD