Assigner | Splunk |
Reserved | 2024-05-30 |
Published | 2024-07-01 |
Updated | 2024-07-03 |
Description
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user.
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
Problem types
Product status
9.1 before 9.1.5
9.0 before 9.0.10
9.1.2308 before 9.1.2308.207
Credits
Anton (therceman)
References
https://advisory.splunk.com/advisories/SVD-2024-0713
https://research.splunk.com/application/fd852b27-1882-4505-9f2c-64dfb96f4fc1