Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36991— Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on Windows

CVSS 7.5 · High EPSS 93.52% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36991

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on Windows
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’…/…//’
Source: NVD (National Vulnerability Database)
Vulnerability Title
Splunk 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Splunk是美国Splunk公司的一套数据收集分析软件。该软件主要用于收集、索引和分析及其所产生的数据,包括所有IT系统和基础结构(物理、虚拟机和云)生成的数据。 Splunk存在安全漏洞。攻击者利用该漏洞可以访问存储在web根文件夹之外的文件和目录。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
SplunkSplunk Enterprise 9.2 ~ 9.2.2 -

II. Public POCs for CVE-2024-36991

#POC DescriptionSource LinkShenlong Link
1POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.https://github.com/bigb0x/CVE-2024-36991POC Details
2Path Traversal On The "/Modules/Messaging/" Endpoint In Splunk Enterprise On Windowshttps://github.com/Mr-xn/CVE-2024-36991POC Details
3CVE-2024-36991: Path traversal that affects Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10.https://github.com/th3gokul/CVE-2024-36991POC Details
4Path traversal vulnerability in Splunk Enterprise on Windowshttps://github.com/sardine-web/CVE-2024-36991POC Details
5Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10 that allows reading sensitive files.https://github.com/Cappricio-Securities/CVE-2024-36991POC Details
6Critical Splunk Vulnerability CVE-2024-36991: Patch Now to Prevent Arbitrary File Readshttps://github.com/jaytiwari05/CVE-2024-36991POC Details
7This binary POC automates the exploitation of CVE-2024-36991 by sending crafted curl requests to a vulnerable Splunk instance. It retrieves sensitive files and saves them locally for further analysis. The script is modular, allowing users to target specific file categories (e.g., credentials, logs, configurations).https://github.com/TcchSquad/CVE-2024-36991-ToolPOC Details
8Proof of Concept for CVE-2024-36991. Path traversal for Splunk versions below 9.2.2, 9.1.5, and 9.0.10 for Windows which allows arbitrary file read.https://github.com/gunzf0x/CVE-2024-36991POC Details
9The modified version of the original script can be described as a Proof of Concept (PoC) Exploit Script for CVE-2024-36991, designed to read sensitive files from a vulnerable Splunk Enterprise instance by leveraging path traversal techniques.https://github.com/xploitnik/CVE-2024-36991-modifiedPOC Details
10In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-36991.yamlPOC Details
11Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Splunk%20Enterprise%20Windows%20%E5%B9%B3%E5%8F%B0%20messaging%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E%20CVE-2024-36991.mdPOC Details
12This binary POC automates the exploitation of CVE-2024-36991 by sending crafted curl requests to a vulnerable Splunk instance. It retrieves sensitive files and saves them locally for further analysis. The script is modular, allowing users to target specific file categories (e.g., credentials, logs, configurations).https://github.com/TheStingR/CVE-2024-36991-ToolPOC Details
13Exploit for CVE-2024-36991 , written by me, enumerates a handfull of things, not all, cause not needed.https://github.com/Zin0D/CVE-2024-36991POC Details
14Exploit for CVE-2024-36991 , written by me, enumerates a handfull of things, not all, cause not needed.https://github.com/0xFZin/CVE-2024-36991POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36991

登录查看更多情报信息。

Same Patch Batch · Splunk · 2024-07-01 · 15 CVEs total

CVE-2024-369848.8 HIGHRemote Code Execution through Serialized Session Payload in Splunk Enterprise on Windows
CVE-2024-369858.8 HIGHRemote Code Execution (RCE) through an external lookup due to “copybuckets.py“ script in t
CVE-2024-369838.0 HIGHCommand Injection using External Lookups
CVE-2024-369827.5 HIGHDenial of Service through null pointer reference in “cluster/config” REST endpoint
CVE-2024-369896.5 MEDIUMLow-privileged user could create notifications in Splunk Web Bulletin Messages
CVE-2024-369906.5 MEDIUMDenial of Service (DoS) on the datamodel/web REST endpoint
CVE-2024-369866.3 MEDIUMRisky command safeguards bypass through Search ID query in Analytics Workspace
CVE-2024-369945.4 MEDIUMPersistent Cross-site Scripting (XSS) in Dashboard Elements
CVE-2024-369925.4 MEDIUMPersistent Cross-site Scripting (XSS) in Dashboard Elements
CVE-2024-369935.4 MEDIUMPersistent Cross-site Scripting (XSS) in Web Bulletin
CVE-2024-369965.3 MEDIUMInformation Disclosure of user names
CVE-2024-369974.6 MEDIUMPersistent Cross-site Scripting (XSS) in conf-web/settings REST endpoint
CVE-2024-369874.3 MEDIUMInsecure File Upload in the indexing/preview REST endpoint
CVE-2024-369954.3 MEDIUMLow-privileged user could create experimental items

IV. Related Vulnerabilities

V. Comments for CVE-2024-36991

No comments yet


Leave a comment