CVE-2024-53247 (GCVE-0-2024-53247)
Vulnerability from cvelistv5
Published
2024-12-10 18:00
Modified
2025-02-28 11:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Summary
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Splunk | Splunk Enterprise |
Version: 9.3 < 9.3.2 Version: 9.2 < 9.2.4 Version: 9.1 < 9.1.7 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-53247", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-10T20:42:00.693072Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-10T21:14:36.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.3.2", "status": "affected", "version": "9.3", "versionType": "custom" }, { "lessThan": "9.2.4", "status": "affected", "version": "9.2", "versionType": "custom" }, { "lessThan": "9.1.7", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "Splunk Secure Gateway", "vendor": "Splunk", "versions": [ { "lessThan": "3.7.13", "status": "affected", "version": "3.7", "versionType": "custom" }, { "lessThan": "3.4.261", "status": "affected", "version": "3.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2024-12-10T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles could perform a Remote Code Execution (RCE)." } ], "value": "In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles could perform a Remote Code Execution (RCE)." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-28T11:03:41.947Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://advisory.splunk.com/advisories/SVD-2024-1205" } ], "source": { "advisory": "SVD-2024-1205" }, "title": "Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2024-53247", "datePublished": "2024-12-10T18:00:24.359Z", "dateReserved": "2024-11-19T18:30:28.773Z", "dateUpdated": "2025-02-28T11:03:41.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-53247\",\"sourceIdentifier\":\"prodsec@splunk.com\",\"published\":\"2024-12-10T18:15:41.703\",\"lastModified\":\"2025-01-02T18:15:19.887\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \u201cadmin\u201c or \u201cpower\u201c Splunk roles could perform a Remote Code Execution (RCE).\"},{\"lang\":\"es\",\"value\":\"En las versiones de Splunk Enterprise anteriores a 9.3.2, 9.2.4 y 9.1.7, y las versiones anteriores a 3.2.461 y 3.7.13 de la aplicaci\u00f3n Splunk Secure Gateway en Splunk Cloud Platform, un usuario con pocos privilegios que no tenga los roles de \u201cadministrador\u201d o \u201cpoder\u201d de Splunk podr\u00eda realizar una ejecuci\u00f3n remota de c\u00f3digo (RCE).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"references\":[{\"url\":\"https://advisory.splunk.com/advisories/SVD-2024-1205\",\"source\":\"prodsec@splunk.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53247\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-10T20:42:00.693072Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-10T20:42:02.499Z\"}}], \"cna\": {\"title\": \"Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app\", \"source\": {\"advisory\": \"SVD-2024-1205\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Danylo Dmytriiev (DDV_UA)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Splunk\", \"product\": \"Splunk Enterprise\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.3\", \"lessThan\": \"9.3.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.2\", \"lessThan\": \"9.2.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.1\", \"lessThan\": \"9.1.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Splunk\", \"product\": \"Splunk Secure Gateway\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.7\", \"lessThan\": \"3.7.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.4\", \"lessThan\": \"3.4.261\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2024-12-10T00:00:00.000Z\", \"references\": [{\"url\": \"https://advisory.splunk.com/advisories/SVD-2024-1205\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \\u201cadmin\\u201c or \\u201cpower\\u201c Splunk roles could perform a Remote Code Execution (RCE).\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the \\u201cadmin\\u201c or \\u201cpower\\u201c Splunk roles could perform a Remote Code Execution (RCE).\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-502\", \"description\": \"The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.\"}]}], \"providerMetadata\": {\"orgId\": \"42b59230-ec95-491e-8425-5a5befa1a469\", \"shortName\": \"Splunk\", \"dateUpdated\": \"2025-02-28T11:03:41.947Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-53247\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-28T11:03:41.947Z\", \"dateReserved\": \"2024-11-19T18:30:28.773Z\", \"assignerOrgId\": \"42b59230-ec95-491e-8425-5a5befa1a469\", \"datePublished\": \"2024-12-10T18:00:24.359Z\", \"assignerShortName\": \"Splunk\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…