Improperly Formatted ‘INGEST_EVAL’ Parameter Crashes Splunk Daemon

Advisory ID: SVD-2024-1006

CVE ID: CVE-2024-45736

Published: 2024-10-14

Last Update: 2024-10-14

CVSSv3.1 Score: 6.5, Medium

CWE: CWE-400

Bug ID: VULN-16989

Description

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.107, 9.1.2312.204, and 9.1.2312.111, a low-privileged user that does not hold the “admin” or “power” Splunk roles could craft a search query with an improperly-formatted “INGEST_EVAL” parameter as part of a Field Transformation which could crash the Splunk daemon (splunkd).

Solution

Upgrade Splunk Enterprise to versions 9.3.1, 9.2.3, 9.1.6, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise9.3splunkd9.3.09.3.1
Splunk Enterprise9.2splunkd9.2.0 to 9.2.29.2.3
Splunk Enterprise9.1splunkd9.1.0 to 9.1.59.1.6
Splunk Cloud Platform9.2.2403splunkd9.2.2403.100 to 9.2.2403.1069.2.2403.107
Splunk Cloud Platform9.1.2312splunkd9.1.2312.200 to 9.1.2312.2039.1.2312.204
Splunk Cloud Platform9.1.2312splunkdBelow 9.1.2312.1119.1.2312.111

Mitigations and Workarounds

None

Detections

Severity

Splunk rates this vulnerability as 6.5, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.

Acknowledgments

Danylo Dmytriiev (DDV_UA)