Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-36997


In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit.


Published

2024-07-01T17:15:09.143

Last Modified

2025-03-07T17:20:49.303

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-79
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application splunk splunk < 9.0.10 Yes
Application splunk splunk < 9.1.5 Yes
Application splunk splunk < 9.2.2 Yes
Application splunk splunk_cloud_platform < 9.1.2312.100 Yes

References