Splunk fixed tens of flaws in Splunk Enterprise and Cloud Platform

Pierluigi Paganini July 04, 2024

Technology company Splunk released security updates to address 16 vulnerabilities in Splunk Enterprise and Cloud Platform.

Technology company Splunk addressed 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including four high-severity flaws.

The vulnerability CVE-2024-36985 is a Remote Code Execution (RCE) through an external lookup due to “copybuckets.py“ script in the “splunk_archiver“ application in Splunk Enterprise.

“In Splunk Enterprise versions below 9.0.10, 9.1.5, and 9.2.2, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could cause a Remote Code Execution through an external lookup that likely references the “splunk_archiver“ application.” reads the advisory. “The “splunk_archiver“ application likely contains a script called “copybuckets.py“ that itself references a file called “erp_launcher.py“, which would likely execute a script called “sudobash. The “sudobash“ script does not perform any input checking. Therefore it runs a bash shell with arguments supplied by the “erp_launcher.py“ file. This can lead to an RCE.”

Splunk Enterprise versions 9.2.2, 9.1.5, and 9.0.10, or higher address the issue, the company also recommends disabling the “splunk_archiver“ application to temporarily mitigate the issue.

The company addressed another high-serverity bug, tracked as CVE-2024-36984, which is a Remote Code Execution through Serialized Session Payload in Splunk Enterprise on Windows.

“In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code.” reads the advisory. “The exploit requires the use of the collect SPL command which writes a file within the Splunk Enterprise installation. The attacker could then use this file to submit a serialized payload that could result in execution of code within the payload.”

Splunk Enterprise versions 9.2.2, 9.1.5, and 9.0.10, or higher address the issue.

If users do not log in to Splunk Web on indexers in a distributed environment, disabling Splunk Web on those indexers can mitigate the issue.

Below is the list of the addressed flaws:

SVDDateTitleSeverityCVE
SVD-2024-07182024-07-01Third-Party Package Updates in Splunk Enterprise – July 2024High
SVD-2024-07172024-07-01Persistent Cross-site Scripting (XSS) in conf-web/settings REST endpointMediumCVE-2024-36997
SVD-2024-07162024-07-01Information Disclosure of user namesMediumCVE-2024-36996
SVD-2024-07152024-07-01Low-privileged user could create experimental itemsMediumCVE-2024-36995
SVD-2024-07142024-07-01Persistent Cross-site Scripting (XSS) in Dashboard ElementsMediumCVE-2024-36994
SVD-2024-07132024-07-01Persistent Cross-site Scripting (XSS) in Web BulletinMediumCVE-2024-36993
SVD-2024-07122024-07-01Persistent Cross-site Scripting (XSS) in Dashboard ElementsMediumCVE-2024-36992
SVD-2024-07112024-07-01Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on WindowsHighCVE-2024-36991
SVD-2024-07102024-07-01Denial of Service (DoS) on the datamodel/web REST endpointMediumCVE-2024-36990
SVD-2024-07092024-07-01Low-privileged user could create notifications in Splunk Web Bulletin MessagesMediumCVE-2024-36989
SVD-2024-07082024-07-01OpenSSL crypto library (libcrypto.so) incorrectly compiled with stack execution bit set in Splunk Enterprise and Universal Forwarder on certain operating systemsInformational
SVD-2024-07072024-07-01Insecure File Upload in the indexing/preview REST endpointMediumCVE-2024-36987
SVD-2024-07062024-07-01Risky command safeguards bypass through Search ID query in Analytics WorkspaceMediumCVE-2024-36986
SVD-2024-07052024-07-01Remote Code Execution (RCE) through an external lookup due to “copybuckets.py“ script in the “splunk_archiver“ application in Splunk EnterpriseHighCVE-2024-36985
SVD-2024-07042024-07-01Remote Code Execution through Serialized Session Payload in Splunk Enterprise on WindowsHighCVE-2024-36984
SVD-2024-07032024-07-01Command Injection using External LookupsHighCVE-2024-36983
SVD-2024-07022024-07-01Denial of Service through null pointer reference in “cluster/config” REST endpointHighCVE-2024-36982
SVD-2024-07012024-07-01Remote Code Execution through dashboard PDF generation componentHigh

The company did not reveal if one of these vulnerabilities was actively exploited in the wild.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, RCE)



you might also like

leave a comment