Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 9.2 ~ 9.2.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file. | https://github.com/bigb0x/CVE-2024-36991 | POC Details |
| 2 | Path Traversal On The "/Modules/Messaging/" Endpoint In Splunk Enterprise On Windows | https://github.com/Mr-xn/CVE-2024-36991 | POC Details |
| 3 | CVE-2024-36991: Path traversal that affects Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10. | https://github.com/th3gokul/CVE-2024-36991 | POC Details |
| 4 | Path traversal vulnerability in Splunk Enterprise on Windows | https://github.com/sardine-web/CVE-2024-36991 | POC Details |
| 5 | Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10 that allows reading sensitive files. | https://github.com/Cappricio-Securities/CVE-2024-36991 | POC Details |
| 6 | Critical Splunk Vulnerability CVE-2024-36991: Patch Now to Prevent Arbitrary File Reads | https://github.com/jaytiwari05/CVE-2024-36991 | POC Details |
| 7 | This binary POC automates the exploitation of CVE-2024-36991 by sending crafted curl requests to a vulnerable Splunk instance. It retrieves sensitive files and saves them locally for further analysis. The script is modular, allowing users to target specific file categories (e.g., credentials, logs, configurations). | https://github.com/TcchSquad/CVE-2024-36991-Tool | POC Details |
| 8 | Proof of Concept for CVE-2024-36991. Path traversal for Splunk versions below 9.2.2, 9.1.5, and 9.0.10 for Windows which allows arbitrary file read. | https://github.com/gunzf0x/CVE-2024-36991 | POC Details |
| 9 | The modified version of the original script can be described as a Proof of Concept (PoC) Exploit Script for CVE-2024-36991, designed to read sensitive files from a vulnerable Splunk Enterprise instance by leveraging path traversal techniques. | https://github.com/xploitnik/CVE-2024-36991-modified | POC Details |
| 10 | In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-36991.yaml | POC Details |
| 11 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Splunk%20Enterprise%20Windows%20%E5%B9%B3%E5%8F%B0%20messaging%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E%20CVE-2024-36991.md | POC Details |
| 12 | This binary POC automates the exploitation of CVE-2024-36991 by sending crafted curl requests to a vulnerable Splunk instance. It retrieves sensitive files and saves them locally for further analysis. The script is modular, allowing users to target specific file categories (e.g., credentials, logs, configurations). | https://github.com/TheStingR/CVE-2024-36991-Tool | POC Details |
| 13 | Exploit for CVE-2024-36991 , written by me, enumerates a handfull of things, not all, cause not needed. | https://github.com/Zin0D/CVE-2024-36991 | POC Details |
| 14 | Exploit for CVE-2024-36991 , written by me, enumerates a handfull of things, not all, cause not needed. | https://github.com/0xFZin/CVE-2024-36991 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-36984 | 8.8 HIGH | Remote Code Execution through Serialized Session Payload in Splunk Enterprise on Windows |
| CVE-2024-36985 | 8.8 HIGH | Remote Code Execution (RCE) through an external lookup due to “copybuckets.py“ script in t |
| CVE-2024-36983 | 8.0 HIGH | Command Injection using External Lookups |
| CVE-2024-36982 | 7.5 HIGH | Denial of Service through null pointer reference in “cluster/config” REST endpoint |
| CVE-2024-36989 | 6.5 MEDIUM | Low-privileged user could create notifications in Splunk Web Bulletin Messages |
| CVE-2024-36990 | 6.5 MEDIUM | Denial of Service (DoS) on the datamodel/web REST endpoint |
| CVE-2024-36986 | 6.3 MEDIUM | Risky command safeguards bypass through Search ID query in Analytics Workspace |
| CVE-2024-36994 | 5.4 MEDIUM | Persistent Cross-site Scripting (XSS) in Dashboard Elements |
| CVE-2024-36992 | 5.4 MEDIUM | Persistent Cross-site Scripting (XSS) in Dashboard Elements |
| CVE-2024-36993 | 5.4 MEDIUM | Persistent Cross-site Scripting (XSS) in Web Bulletin |
| CVE-2024-36996 | 5.3 MEDIUM | Information Disclosure of user names |
| CVE-2024-36997 | 4.6 MEDIUM | Persistent Cross-site Scripting (XSS) in conf-web/settings REST endpoint |
| CVE-2024-36987 | 4.3 MEDIUM | Insecure File Upload in the indexing/preview REST endpoint |
| CVE-2024-36995 | 4.3 MEDIUM | Low-privileged user could create experimental items |
No comments yet