4.3

CVE-2024-45737

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the "admin" or "power" Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

Data is provided by the National Vulnerability Database (NVD)
SplunkSplunk SwEditionenterprise Version >= 9.1.0 < 9.1.6
SplunkSplunk SwEditionenterprise Version >= 9.2.0 < 9.2.3
SplunkSplunk Version9.3.0 SwEditionenterprise
SplunkSplunk Cloud Platform Version >= 9.1.2312 < 9.1.2312.204
SplunkSplunk Cloud Platform Version >= 9.2.2403.102 < 9.2.2403.108
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.028
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.5 2.1 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
prodsec@splunk.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.