{"id":3845,"date":"2024-07-03T09:36:35","date_gmt":"2024-07-03T14:36:35","guid":{"rendered":"https:\/\/cert.pa\/?p=3845"},"modified":"2024-07-03T09:37:24","modified_gmt":"2024-07-03T14:37:24","slug":"csirt-panama-aviso-2024-07-3-splunk-actualizacion-de-seguridad-de-splunk-enterprise-cloud-plataforma","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3845","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-07-3 Splunk: Actualizaci\u00f3n de seguridad de Splunk Enterprise \/ Cloud Plataforma"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Gravedad: Alta\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0                                                                                   <\/p>\n\n\n\n<p>Fecha de publicaci\u00f3n: julio 3, 2024<br>\u00daltima revisi\u00f3n: julio 3, 2024                                                                                                                                    Sitio web: splunk.com<\/p>\n\n\n\n<p>Sistemas Afectados:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Splunk Enterprise (9.0.x. \/ 9.1.x \/ 9.2.x)<\/li>\n\n\n\n<li>Splunk Cloud Platform (9.1.2312\u00a0\u00a0 \/ 9.1.2308)<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>I. <strong>Descripci\u00f3n<\/strong><\/p>\n\n\n\n<p>Se han publicado varias vulnerabilidades que afectan a los productos Splunk Enterprise y Cloud Platforma.<\/p>\n\n\n\n<p>II. <strong>Impacto<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" style=\"list-style-type:upper-roman\"><\/ol>\n\n\n\n<p>El comunicado de seguridad, indica 15 vulnerabilidades: 5 de severidad alta, 10 de severidad media.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>SVD<\/td><td>Date<strong><\/strong><\/td><td><strong>Vulnerabilidad<\/strong><\/td><td><strong>Severidad<\/strong><\/td><td><strong>CVE<\/strong><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0717\">SVD-2024-0717<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0717\">Secuencias de comandos entre sitios (XSS) persistentes en el punto final REST conf-web\/settings<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36997\">CVE-2024-36997<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0716\">SVD-2024-0716<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0716\">Divulgaci\u00f3n de informaci\u00f3n de nombres de usuario<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36996\">CVE-2024-36996<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0715\">SVD-2024-0715<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0715\">Un usuario con pocos privilegios podr\u00eda crear elementos experimentales<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36995\">CVE-2024-36995<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0714\">SVD-2024-0714<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0714\">Secuencias de comandos entre sitios (XSS) persistentes en elementos del panel<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36994\">CVE-2024-36994<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0713\">SVD-2024-0713<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0713\">Secuencias de comandos entre sitios (XSS) persistentes en boletines web<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36993\">CVE-2024-36993<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0712\">SVD-2024-0712<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0712\">Secuencias de comandos entre sitios (XSS) persistentes en elementos del panel<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36992\">CVE-2024-36992<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0711\">SVD-2024-0711<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0711\">Recorrido de ruta en el punto final \u201c\/modules\/messaging\/\u201c en Splunk Enterprise en Windows<\/a><\/td><td>Alta<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36991\">CVE-2024-36991<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0710\">SVD-2024-0710<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0710\">Denegaci\u00f3n de servicio (DoS) en el punto final REST del modelo de datos\/web<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36990\">CVE-2024-36990<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0709\">SVD-2024-0709<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0709\">Un usuario con pocos privilegios podr\u00eda crear notificaciones en los mensajes de Splunk Web Bulletin<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36989\">CVE-2024-36989<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0707\">SVD-2024-0707<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0707\">Carga de archivos insegura en el punto final REST de indexaci\u00f3n\/vista previa<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36987\">CVE-2024-36987<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0706\">SVD-2024-0706<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0706\">Comandos riesgosos evitan las protecciones mediante consultas de ID de b\u00fasqueda en Analytics Workspace<\/a><\/td><td>Media<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36986\">CVE-2024-36986<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0705\">SVD-2024-0705<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0705\">Ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de una b\u00fasqueda externa debido al script \u201ccopybuckets.py\u201d en la aplicaci\u00f3n \u201csplunk_archiver\u201d en Splunk Enterprise<\/a><\/td><td>Alta<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36985\">CVE-2024-36985<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0704\">SVD-2024-0704<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0704\">Ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de la carga \u00fatil de sesi\u00f3n serializada en Splunk Enterprise en Windows<\/a><\/td><td>Alta<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36984\">CVE-2024-36984<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0703\">SVD-2024-0703<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0703\">Inyecci\u00f3n de comandos mediante b\u00fasquedas externas<\/a><\/td><td>Alta<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36983\">CVE-2024-36983<\/a><\/td><\/tr><tr><td><strong><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0702\">SVD-2024-0702<\/a><\/strong><\/td><td>2024-07-01<\/td><td><a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0702\">Denegaci\u00f3n de servicio a trav\u00e9s de una referencia de puntero nulo en el punto final REST \u201ccluster\/config\u201d<\/a><\/td><td>Alta<\/td><td><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-36982\">CVE-2024-36982<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>El comunicado de seguridad comparte 3 notas de importantes:<\/p>\n\n\n\n<p><strong>SVD-2024-0701 &#8211; Ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del componente de generaci\u00f3n de PDF del panel de control&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Severidad Alta<\/strong><\/p>\n\n\n\n<p>En las versiones de Splunk Enterprise anteriores a 9.2.2, 9.1.5 y 9.0.10 y en las versiones de Splunk Cloud Platform anteriores a 9.1.2312.109 y 9.1.2308.203, un usuario autenticado podr\u00eda ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente de generaci\u00f3n de PDF del panel de control.<\/p>\n\n\n\n<p>El punto de conexi\u00f3n REST pdfgen\/render utiliza una versi\u00f3n vulnerable de la biblioteca Python ReportLab Toolkit (v3.6.1) con una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto.<\/p>\n\n\n\n<p><strong>SVD-2024-0718&nbsp; &#8211;<\/strong> <strong>Actualizaciones de paquetes de terceros en Splunk Enterprise: julio de 2024 &#8211; Severidad Alta<\/strong><\/p>\n\n\n\n<p>Splunk solucion\u00f3 vulnerabilidades y exposiciones comunes (CVE) en paquetes de terceros en las versiones 9.2.1, 9.1.4, 9.0.9 y superiores de Splunk Enterprise.<\/p>\n\n\n\n<p><strong>SVD-2024-0708 &#8211; La biblioteca criptogr\u00e1fica OpenSSL (libcrypto.so) se compil\u00f3 incorrectamente con el bit de ejecuci\u00f3n de pila configurado en Splunk Enterprise y Universal Forwarder en ciertos sistemas operativos&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Severidad Baja&nbsp;<\/strong><\/p>\n\n\n\n<p>En ciertas versiones espec\u00edficas y arquitecturas de plataforma de Splunk Enterprise y Universal Forwarder, la biblioteca criptogr\u00e1fica para OpenSSL (libcrypto.so) se compil\u00f3 incorrectamente con su bit de ejecuci\u00f3n de pila establecido. Establecer el bit ejecutable en archivos de biblioteca .so no es una vulnerabilidad directa.<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Instalar las actualizaciones correspondientes, seg\u00fan indique el fabricante.<\/p>\n\n\n\n<p>Versiones parchadas:<\/p>\n\n\n\n<p>Splunk Enterprise: 9.2.2, 9.1.5 y 9.0.10;<\/p>\n\n\n\n<p>Splunk Cloud Plataforma: 9.1.2312.109 y 9.1.2308.207.<\/p>\n\n\n\n<p>Soporte: https:\/\/advisory.splunk.com\/advisories<\/p>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>CSIRT Chile. Avisos Seguridad, Splunk Enterprise y otros &#8211; Vulnerabilidades. 2 de julio del 2024. Recopilado en: https:\/\/csirt.gob.cl\/alertas\/vsa24-01038\/<\/li>\n\n\n\n<li>Splunk Oficial. \u00a01 de julio del 2024. Security Advisories. Recopilado en: https:\/\/advisory.splunk.com\/advisories<\/li>\n<\/ol>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: Alta\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fecha de publicaci\u00f3n: julio 3, 2024\u00daltima revisi\u00f3n: julio 3, 2024 Sitio web: splunk.com Sistemas Afectados: Splunk Enterprise (9.0.x. \/ 9.1.x \/ 9.2.x) Splunk Cloud Platform (9.1.2312\u00a0\u00a0 \/ 9.1.2308) I. Descripci\u00f3n Se han publicado&#8230;<\/p>\n","protected":false},"author":4,"featured_media":3848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[43,8,72,73,80,68],"class_list":["post-3845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3845"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3845\/revisions"}],"predecessor-version":[{"id":3847,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3845\/revisions\/3847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/3848"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}