A recently patched vulnerability (CVE-2024-36991) in Splunk Enterprise on Windows is more severe than initially thought, as reported by SonicWall’s threat researchers. This flaw, discovered by Danylo Dmytriiev, is a path traversal vulnerability in Splunk Web, the platform's user interface, which permits attackers to access files and directories outside the restricted directory (/modules/messaging/). Splunk Enterprise is a widely-used data analytics and monitoring platform that helps organizations collect and analyze machine-generated data from various sources, including network and security devices, servers, and more. The vulnerability stems from the Python os.path.join function, which removes the drive letter from path tokens if the drive in the token matches the drive in the built path. This issue can be exploited via a specially crafted GET request, enabling an attacker to list directories on the Splunk endpoint without prior authentication. Multiple Proof-of-Concept (PoC) exploits have already been published, including one by IT consultant Mohamed Nabil Ali that scans for vulnerable internet-facing endpoints and attempts to read the /etc/passwd file. According to SonicWall, “An attacker only needs remote access to the instance, either over the Internet or a local network,” making this vulnerability particularly concerning. Organizations using Splunk Enterprise on Windows are advised to apply the latest patches promptly to mitigate the risk posed by this vulnerability. The severity and ease of exploitation underscore the critical need for timely updates and vigilant security practices.
Web server administrators are urged to prioritize a critical update following the release of new versions of Nginx and the community-driven FreeNginx project. These updates address...
Rockstar Games has confirmed a data breach linked to a broader security incident involving Anodot, a third-party data analytics provider. The breach is attributed to the ShinyHunte...
A critical vulnerability identified as CVE 2026 5194 has been discovered in the wolfSSL SSL TLS library affecting how certificate signatures are verified. The flaw allows improper ...