CVE-2024-36991

HIGH EXPLOITED NUCLEI

Splunk < 9.0.10 - Path Traversal

Title source: rule

Description

In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.

Exploits (13)

nomisec WORKING POC 125 stars
by bigb0x · infoleak
https://github.com/bigb0x/CVE-2024-36991
nomisec WORKING POC 9 stars
by jaytiwari05 · infoleak
https://github.com/jaytiwari05/CVE-2024-36991
nomisec WORKING POC 9 stars
by Mr-xn · infoleak
https://github.com/Mr-xn/CVE-2024-36991
nomisec WORKING POC 4 stars
by gunzf0x · infoleak
https://github.com/gunzf0x/CVE-2024-36991
github WORKING POC 3 stars
by Pocland-db · pythonpoc
https://github.com/Pocland-db/cve-pocs/tree/main/2024/CVE-2024-36991
nomisec WORKING POC 3 stars
by 0xFZin · poc
https://github.com/0xFZin/CVE-2024-36991
nomisec SCANNER 3 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2024-36991
nomisec SUSPICIOUS 2 stars
by TheStingR · poc
https://github.com/TheStingR/CVE-2024-36991-Tool
nomisec SCANNER 2 stars
by sardine-web · infoleak
https://github.com/sardine-web/CVE-2024-36991
nomisec WORKING POC 2 stars
by th3gokul · infoleak
https://github.com/th3gokul/CVE-2024-36991
nomisec WORKING POC
by jhurtadomi · remote
https://github.com/jhurtadomi/CVE-2024-36991-Splunk
github WORKING POC
by milo2012 · pythonpoc
https://github.com/milo2012/CVE-PoCs/tree/main/CVE-2024-36991.py
vulncheck_xdb WORKING POC
infoleak
https://github.com/Zin0D/CVE-2024-36991

Nuclei Templates (1)

Splunk Enterprise - Local File Inclusion
HIGHVERIFIEDby DhiyaneshDK
Shodan: html:"Login | Splunk"

Scores

CVSS v3 7.5
EPSS 0.9352
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2024-11-03
CWE
CWE-22 CWE-35
Status published
Products (1)
splunk/splunk 9.0.0 - 9.0.10
Published Jul 01, 2024
Tracked Since Feb 18, 2026