Persistent Cross-Site Scripting (XSS) via props.conf on Splunk Enterprise

Advisory ID: SVD-2024-1011

CVE ID: CVE-2024-45741

Published: 2024-10-14

Last Update: 2024-10-14

CVSSv3.1 Score: 5.4, Medium

CWE: CWE-79

Bug ID: VULN-17034

Description

In Splunk Enterprise versions below 9.2.3 and 9.1.6 and Splunk Cloud Platform versions below 9.2.2403.108 and 9.1.2312.205, a low-privileged user that does not hold the “admin” or “power” Splunk roles could create a malicious payload through a custom configuration file that the “api.uri” parameter from the “/manager/search/apps/local” endpoint in Splunk Web calls. This could result in execution of unauthorized JavaScript code in the browser of a user.

Solution

Upgrade Splunk Enterprise to versions 9.3.0, 9.2.3, 9.1.6, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise9.3Splunk WebNot affected9.3.0
Splunk Enterprise9.2Splunk Web9.2.0 to 9.2.29.2.3
Splunk Enterprise9.1Splunk Web9.1.0 to 9.1.59.1.6
Splunk Cloud Platform9.2.2403Splunk Web9.2.2403.100 to 9.2.2403.1079.2.2403.108
Splunk Cloud Platform9.1.2312Splunk WebBelow 9.1.2312.2059.1.2312.205

Mitigations and Workarounds

The vulnerability affects instances with Splunk Web enabled, turning Splunk Web off is a possible workaround. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file for more information on disabling Splunk Web.

Detections

Severity

Splunk rates this vulnerability as 5.4, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N.

If the Splunk Enterprise instance does not run Splunk Web, there should be no impact and the severity would be informational.

Acknowledgments

Danylo Dmytriiev (DDV_UA)