Skip to content

POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.

Notifications You must be signed in to change notification settings

bigb0x/CVE-2024-36991

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-36991

POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.

Banner

Overview

This is a bulk scanning and exploitation tool for CVE-2024-36991: Path traversal that affects Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10. This vulnerability was discovered by Danylo Dmytriiev.

How to Use

Minimum Requirements

  • Python 3.6 or higher
  • requests library

Single Target:

python CVE-2024-36991.py -u https://target:9090

Bulk Sscan:

python CVE-2024-36991.py -f targets.txt

How to Protect Your Splunk Appliance

The vulnerability affects instances with Splunk Web turned on. You could turn Splunk Web off as a possible workaround. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file for more information on turning Splunk Web off.

Contact

For any suggestions or thoughts, please get in touch with me.

Disclaimer

I like to create my own tools for fun, work and educational purposes only. I do not support or encourage hacking or unauthorized access to any system or network. Please use my tools responsibly and only on systems where you have clear permission to test.

References

About

POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages