In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-1201 |
Configurations
No configuration.
History
10 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-10 18:15
Updated : 2024-12-10 18:15
NVD link : CVE-2024-53243
Mitre link : CVE-2024-53243
CVE.ORG link : CVE-2024-53243
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor