{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-53246","assignerOrgId":"42b59230-ec95-491e-8425-5a5befa1a469","state":"PUBLISHED","assignerShortName":"Splunk","dateReserved":"2024-11-19T18:30:28.773Z","datePublished":"2024-12-10T18:01:16.803Z","dateUpdated":"2025-02-28T11:03:55.865Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"9.3","status":"affected","versionType":"custom","lessThan":"9.3.2"},{"version":"9.2","status":"affected","versionType":"custom","lessThan":"9.2.4"},{"version":"9.1","status":"affected","versionType":"custom","lessThan":"9.1.7"}]},{"product":"Splunk Cloud Platform","vendor":"Splunk","versions":[{"version":"9.3.2408","status":"affected","versionType":"custom","lessThan":"9.3.2408.101"},{"version":"9.2.2406","status":"affected","versionType":"custom","lessThan":"9.2.2406.106"},{"version":"9.2.2403","status":"affected","versionType":"custom","lessThan":"9.2.2403.111"},{"version":"9.1.2312","status":"affected","versionType":"custom","lessThan":"9.1.2312.206"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation."}],"value":"In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and Splunk Cloud Platform versions below 9.3.2408.101, 9.2.2406.106, 9.2.2403.111, and 9.1.2312.206, an SPL command can potentially disclose sensitive information. The vulnerability requires the exploitation of another vulnerability, such as a Risky Commands Bypass, for successful exploitation."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2024-1204"}],"title":"Sensitive Information Disclosure through SPL commands","datePublic":"2024-12-10T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1","baseScore":5.3,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.","cweId":"CWE-319"}]}],"source":{"advisory":"SVD-2024-1204"},"providerMetadata":{"orgId":"42b59230-ec95-491e-8425-5a5befa1a469","shortName":"Splunk","dateUpdated":"2025-02-28T11:03:55.865Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-10T20:39:36.685783Z","id":"CVE-2024-53246","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-10T21:13:47.167Z"}}]}}