CVE-2024-36991
HIGH EXPLOITED NUCLEISplunk < 9.0.10 - Path Traversal
Title source: ruleDescription
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
Exploits (13)
github
WORKING POC
3 stars
by Pocland-db · pythonpoc
https://github.com/Pocland-db/cve-pocs/tree/main/2024/CVE-2024-36991
nomisec
SCANNER
3 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2024-36991
github
WORKING POC
by milo2012 · pythonpoc
https://github.com/milo2012/CVE-PoCs/tree/main/CVE-2024-36991.py
Nuclei Templates (1)
Splunk Enterprise - Local File Inclusion
HIGHVERIFIEDby DhiyaneshDK
Shodan:
html:"Login | Splunk"
Scores
CVSS v3
7.5
EPSS
0.9352
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-11-03
CWE
CWE-22
CWE-35
Status
published
Products (1)
splunk/splunk
9.0.0 - 9.0.10
Published
Jul 01, 2024
Tracked Since
Feb 18, 2026