CVE-2023-22935Improper Input Validation in Cloud Platform

Severity
8.8HIGHNVD
CNA8.1
EPSS
0.1%
top 67.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateJul 6

Description

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘display.page.search.patterns.sensitivity’ search parameter lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5splunk/splunk_enterprise8.18.1.13+2
NVDsplunk/splunk8.1.08.1.13+2
CVEListV5splunk/splunk_cloud_platform-9.0.2209.3

🔴Vulnerability Details

2
GHSA
GHSA-vrpm-3gh9-qhp6: In Splunk Enterprise versions below 82023-07-06
CVEList
SPL Command Safeguards Bypass via the ‘display.page.search.patterns.sensitivity’ Search Parameter in Splunk Enterprise2023-02-14
CVE-2023-22935 — Improper Input Validation in Splunk | cvebase