CVE-2024-45741

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform where low-privileged users can create malicious configuration files that execute unauthorized JavaScript in other users' browsers. The vulnerability affects users without admin or power roles who can access the affected endpoint. Successful exploitation requires an attacker to have authenticated access to the Splunk instance.

💻 Affected Systems

Products:
  • Splunk Enterprise
  • Splunk Cloud Platform
Versions: Splunk Enterprise below 9.2.3 and 9.1.6; Splunk Cloud Platform below 9.2.2403.108 and 9.1.2312.205
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with permissions to create custom configuration files and access to the affected endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated low-privileged user could execute arbitrary JavaScript in the browser of other users, potentially stealing session cookies, performing actions as the victim user, or conducting further attacks within the Splunk environment.

🟠

Likely Case

Low-privileged authenticated users could perform limited XSS attacks against other users, potentially stealing session data or performing unauthorized actions within the victim's browser context.

🟢

If Mitigated

With proper role-based access controls and input validation, the attack surface is limited to authenticated users with specific permissions, reducing the overall risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of Splunk configuration file structure. The vulnerability is in the api.uri parameter handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Splunk Enterprise 9.2.3, 9.1.6; Splunk Cloud Platform 9.2.2403.108, 9.1.2312.205

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2024-1011

Restart Required: Yes

Instructions:

1. Backup your Splunk configuration and data. 2. Download the appropriate patch from Splunk's website. 3. Stop Splunk services. 4. Apply the patch according to Splunk's upgrade documentation. 5. Restart Splunk services. 6. Verify the version is updated.

🔧 Temporary Workarounds

Restrict access to affected endpoint

all

Limit access to the /manager/search/apps/local endpoint to only users who absolutely need it.

Configure Splunk's role-based access control to restrict endpoint access

Implement Content Security Policy

all

Add Content Security Policy headers to mitigate XSS impact

Configure web server or Splunk to include CSP headers

🧯 If You Can't Patch

  • Review and restrict user permissions, ensuring only necessary users have access to create custom configuration files
  • Implement network segmentation to isolate Splunk instances and limit lateral movement potential

🔍 How to Verify

Check if Vulnerable:

Check Splunk version via the web interface (Settings > Server Settings > General Settings) or command line

Check Version:

On Splunk server: $SPLUNK_HOME/bin/splunk version

Verify Fix Applied:

Verify the version is equal to or higher than the patched versions listed in the fix section

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration file creation/modification events
  • Suspicious access patterns to /manager/search/apps/local endpoint

Network Indicators:

  • Unusual outbound connections from Splunk web interface
  • Suspicious JavaScript payloads in HTTP requests

SIEM Query:

index=_internal source=*web_access.log uri_path="/manager/search/apps/local" | stats count by clientip, user

🔗 References

📤 Share & Export