CVE-2024-36992

In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of unauthorized JavaScript code in the browser of a user. The url parameter of the Dashboard element does not have proper input validation to reject invalid URLs, which could lead to a Persistent Cross-site Scripting (XSS) exploit.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
SplunkCNA
5.4 MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
VendorProductVersion
splunksplunk
9.0.0 ≤
𝑥
< 9.0.10
splunksplunk
9.1.0 ≤
𝑥
< 9.1.5
splunksplunk
9.2.0 ≤
𝑥
< 9.2.2
splunksplunk_cloud_platform
9.1.2308 ≤
𝑥
< 9.1.2308.207
splunksplunk_cloud_platform
9.1.2312 ≤
𝑥
< 9.1.2312.200
𝑥
= Vulnerable software versions