Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-32707Improper Authorization in Cloud Platform

Severity
8.8HIGHNVD
EPSS
82.7%
top 0.76%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 1
Latest updateOct 9

Description

In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5splunk/splunk_cloud_platform-9.0.2303.100
NVDsplunk/splunk_cloud_platform< 9.0.2303.100
CVEListV5splunk/splunk_enterprise8.18.1.14+2
NVDsplunk/splunk8.1.08.1.14+2

🔴Vulnerability Details

2
GHSA
GHSA-m653-m4xm-rxrr: In versions of Splunk Enterprise below 92023-07-06
CVEList
‘edit_user’ Capability Privilege Escalation2023-06-01

💥Exploits & PoCs

1
Exploit-DB
Splunk 9.0.5 - admin account take over2023-10-09
CVE-2023-32707 — Improper Authorization in Splunk | cvebase