Lucene search

K
cveSplunkCVE-2023-46214
HistoryNov 16, 2023 - 9:15 p.m.

CVE-2023-46214

2023-11-1621:15:08
CWE-91
Splunk
web.nvd.nist.gov
170
21
splunk
enterprise
xslt
nvd
cve-2023-46214

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.314

Percentile

97.1%

In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.

Affected configurations

Nvd
Node
splunkcloudRange<9.1.2308
OR
splunksplunkRange9.0.09.0.7enterprise
OR
splunksplunkRange9.1.09.1.2enterprise
VendorProductVersionCPE
splunkcloud*cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*
splunksplunk*cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*

CNA Affected

[
  {
    "product": "Splunk Enterprise",
    "vendor": "Splunk",
    "versions": [
      {
        "version": "9.0",
        "status": "affected",
        "versionType": "custom",
        "lessThan": "9.0.7"
      },
      {
        "version": "9.1",
        "status": "affected",
        "versionType": "custom",
        "lessThan": "9.1.2"
      }
    ]
  },
  {
    "product": "Splunk Cloud",
    "vendor": "Splunk",
    "versions": [
      {
        "version": "-",
        "status": "affected",
        "versionType": "custom",
        "lessThan": "9.1.2308"
      }
    ]
  }
]

Social References

More

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.314

Percentile

97.1%