Description
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.2.2403.100, an authenticated, low-privileged user that does not hold the admin or power Splunk roles could send a specially crafted HTTP POST request to the datamodel/web REST endpoint in Splunk Enterprise, potentially causing a denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36377 | In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.2.2403.100, an authenticated, low-privileged user that does not hold the admin or power Splunk roles could send a specially crafted HTTP POST request to the datamodel/web REST endpoint in Splunk Enterprise, potentially causing a denial of service. |
References
History
Wed, 21 Aug 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk Splunk splunk Cloud Platform |
|
| CPEs | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Splunk
Splunk splunk Splunk splunk Cloud Platform |
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:44.950Z
Reserved: 2024-05-30T16:36:21.001Z
Link: CVE-2024-36990
Updated: 2024-08-02T03:43:50.595Z
Status : Modified
Published: 2024-07-01T17:15:07.600
Modified: 2024-11-21T09:22:59.170
Link: CVE-2024-36990
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD