Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app
Advisory ID: SVD-2024-1205
CVE ID: CVE-2024-53247
Published: 2024-12-10
Last Update: 2024-12-10
CVSSv3.1 Score: 8.8, High
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE: CWE-502
Bug ID: VULN-16622
Description
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.2.461 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).
The RCE is possible because of an unsafe deserialization of data due to an insecure usage of the jsonpickle Python library.
Solution
Upgrade Splunk Enterprise to versions 9.3.2, 9.2.4, and 9.1.7, or higher.
Splunk is actively monitoring and patching Splunk Cloud Platform instances.
Product Status
Product | Version | Component | Affected Version | Fix Version |
---|---|---|---|---|
Splunk Enterprise | 9.3 | Splunk Secure Gateway | 9.3.1 | 9.3.2 |
Splunk Enterprise | 9.2 | Splunk Secure Gateway | 9.2.3 | 9.2.4 |
Splunk Enterprise | 9.1 | Splunk Secure Gateway | 9.1.0 to 9.1.6 | 9.1.7 |
Splunk Secure Gateway | 3.7 | Below 3.7.13 | 3.7.13 | |
Splunk Secure Gateway | 3.4 | Below 3.4.261 | 3.4.261 |
Mitigations and Workarounds
Disable the Splunk Secure Gateway App. See Manage app and add-on objects.
Note: Splunk Mobile, Spacebridge, and Mission Control rely on functionality in the Splunk Secure Gateway app. If you do not use any of the apps, features, or functionality, as a potential mitigation, you may remove or disable the app.
Detections
None
Severity
Splunk rates this vulnerability as 8.8, High, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.
If you remove or disable the Splunk Secure Gateway app, there should be no impact and the severity would be informational.
Acknowledgments
Danylo Dmytriiev (DDV_UA)