CVE-2023-22934Improper Input Validation in Cloud Platform

Severity
8.0HIGHNVD
CNA7.3
EPSS
0.1%
top 68.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateJul 6

Description

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages4 packages

CVEListV5splunk/splunk_enterprise8.18.1.13+2
NVDsplunk/splunk8.1.08.1.13+2
CVEListV5splunk/splunk_cloud_platform-9.0.2209.3

🔴Vulnerability Details

2
GHSA
GHSA-p7r4-77g3-vcrx: In Splunk Enterprise versions below 82023-07-06
CVEList
SPL Command Safeguards Bypass via the ‘pivot’ SPL Command in Splunk Enterprise2023-02-14
CVE-2023-22934 — Improper Input Validation in Splunk | cvebase