CVE-2024-53243

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control.
Configurations

No configuration.

History

10 Dec 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-10 18:15

Updated : 2024-12-10 18:15


NVD link : CVE-2024-53243

Mitre link : CVE-2024-53243

CVE.ORG link : CVE-2024-53243


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor