Maintenance mode state change of App Key Value Store (KVStore) through Cross-Site Request Forgery (CSRF)

Advisory ID: SVD-2024-1007

CVE ID: CVE-2024-45737

Published: 2024-10-14

Last Update: 2024-10-14

CVSSv3.1 Score: 4.3, Medium

CWE: CWE-352

Bug ID: VULN-15375

DescriptionPermalink

In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108, and 9.1.2312.204, a low-privileged user that does not hold the “admin” or “power” Splunk roles could change the maintenance mode state of App Key Value Store (KVStore) through a Cross-Site Request Forgery (CSRF).

SolutionPermalink

Upgrade Splunk Enterprise to versions 9.3.1, 9.2.3, 9.1.6, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product StatusPermalink

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise9.3Splunk Web9.3.09.3.1
Splunk Enterprise9.2Splunk Web9.2.0 to 9.2.29.2.3
Splunk Enterprise9.1Splunk Web9.1.0 to 9.1.59.1.6
Splunk Cloud Platform9.2.2403Splunk Web9.2.2403.102 to 9.2.2403.1079.2.2403.108
Splunk Cloud Platform9.1.2312Splunk WebBelow 9.1.2312.2049.1.2312.204

Mitigations and WorkaroundsPermalink

The vulnerability affects instances with Splunk Web turned on. You could turn Splunk Web off as a possible workaround. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file for more information on turning Splunk Web off.

DetectionsPermalink

SeverityPermalink

Splunk rates this vulnerability as a 4.3, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L.

If the Splunk Enterprise instance does not run Splunk Web, there should be no impact and the severity would be informational.

AcknowledgmentsPermalink

Anton (therceman)