Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app

Advisory ID: SVD-2024-1205

CVE ID: CVE-2024-53247

Published: 2024-12-10

Last Update: 2024-12-10

CVSSv3.1 Score: 8.8, High

CWE: CWE-502

Bug ID: VULN-16622

Description

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.2.461 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).

The RCE is possible because of an unsafe deserialization of data due to an insecure usage of the jsonpickle Python library.

Solution

Upgrade Splunk Enterprise to versions 9.3.2, 9.2.4, and 9.1.7, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise9.3Splunk Secure Gateway9.3.19.3.2
Splunk Enterprise9.2Splunk Secure Gateway9.2.39.2.4
Splunk Enterprise9.1Splunk Secure Gateway9.1.0 to 9.1.69.1.7
Splunk Secure Gateway3.7Below 3.7.133.7.13
Splunk Secure Gateway3.4Below 3.4.2613.4.261

Mitigations and Workarounds

Disable the Splunk Secure Gateway App. See Manage app and add-on objects.

Note: Splunk Mobile, Spacebridge, and Mission Control rely on functionality in the Splunk Secure Gateway app. If you do not use any of the apps, features, or functionality, as a potential mitigation, you may remove or disable the app.

Detections

None

Severity

Splunk rates this vulnerability as 8.8, High, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.

If you remove or disable the Splunk Secure Gateway app, there should be no impact and the severity would be informational.

Acknowledgments

Danylo Dmytriiev (DDV_UA)