Vulnerability in Splunk Enterprise allowing unauthorized access to index metrics.
This CVE-2024-23676 was published on January 22, 2024, by Splunk. It involves a vulnerability in Splunk Enterprise versions below 9.0.8 and 9.1.3, allowing low-privileged users to view metrics on an index that they do not have permission to access. The exploit necessitates user interaction from a high-privileged user.
Understanding CVE-2024-23676
This vulnerability, titled "Sensitive Information Disclosure of Index Metrics through 'mrollup' SPL Command," poses a security risk to affected Splunk Enterprise and Splunk Cloud versions.
What is CVE-2024-23676?
The vulnerability in Splunk versions below 9.0.8 and 9.1.3 enables low-privileged users to access metrics on an index they lack permission to view. Exploiting this vulnerability requires the involvement of a high-privileged user.
The Impact of CVE-2024-23676
The impact of this vulnerability is rated as MEDIUM according to CVSS:3.1. It could potentially lead to sensitive information disclosure by allowing unauthorized access to index metrics.
Technical Details of CVE-2024-23676
The following technical details provide insight into the vulnerability:
Vulnerability Description
The 'mrollup' SPL command in Splunk versions below 9.0.8 and 9.1.3 allows low-privileged users to view metrics on an index without proper permissions, facilitated by user interaction from a high-privileged user.
Affected Systems and Versions
Exploitation Mechanism
Exploiting this vulnerability requires a low-privileged user to leverage the 'mrollup' SPL command to access metrics on an index that they do not have authorization to view.
Mitigation and Prevention
To address CVE-2024-23676 and enhance system security, take the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Adhere to Splunk's security advisories and promptly apply patches and updates to mitigate vulnerabilities like CVE-2024-23676. Regularly monitor for new security advisories and implement patches in a timely manner.