CVE-2023-40598Command Injection in Cloud

Severity
8.8HIGHNVD
CNA8.5
EPSS
0.1%
top 75.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 30

Description

In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDsplunk/splunk_cloud_platform< 9.0.2305.200
CVEListV5splunk/splunk_enterprise8.28.2.12+2
NVDsplunk/splunk9.0.09.0.6+2
CVEListV5splunk/splunk_cloud-9.0.2305.200

🔴Vulnerability Details

2
GHSA
GHSA-5ghx-2vfx-7347: In Splunk Enterprise versions below 82023-08-30
CVEList
Command Injection in Splunk Enterprise Using External Lookups2023-08-30
CVE-2023-40598 — Command Injection in Splunk Cloud | cvebase