CVE-2024-36991 Exploit PoC: Path Traversal to Arbitrary File Read in Splunk Enterprise versions < 9.2.2, 9.1.5 and 9.0.10
This vulnerability exists due to a os.path.join function in Python which removes the drive letter from path tokens if the drive in the token matches the drive in the built path. However, the path traversal exists on the /modules/messaging/ endpoint in Splunk Enterprise where Splunk Web is enabled.