关联漏洞
标题:
Splunk 安全漏洞
(CVE-2024-36991)
描述:Splunk是美国Splunk公司的一套数据收集分析软件。该软件主要用于收集、索引和分析及其所产生的数据,包括所有IT系统和基础结构(物理、虚拟机和云)生成的数据。 Splunk存在安全漏洞。攻击者利用该漏洞可以访问存储在web根文件夹之外的文件和目录。
描述
Path traversal vulnerability in Splunk Enterprise on Windows
介绍
# CVE-2024-36991 Nuclei Template
## Description
This repository contains a Nuclei template to detect the path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10. The vulnerability allows unauthorized access to sensitive files, such as `/etc/passwd`.
## CVE Details
- **CVE ID**: CVE-2024-36991
- **Vulnerability Type**: Path Traversal
- **Affected Software**: Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10
- **Author**: Sardine Web
- **Reference**:
- [Twitter Author](https://twitter.com/sardine_web)
## Usage
### Single Scan
To run a single scan using this template, use the following command:
nuclei -u https://target:9090 -t CVE-2024-36991.yaml
# Disclaimer
This template is created for educational purposes only. Unauthorized use of this template on systems you do not own or have explicit permission to test is illegal and unethical. Use this tool responsibly and only on systems where you have permission to perform security testing.
# License
This project is licensed under the MIT License.
Author: Sardine Web
文件快照
[4.0K] /data/pocs/db303ec9eae75c1ed3f1edf788f6660510deda51
├── [1.0K] CVE-2024-36991.yaml
└── [1.1K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。