- Description
- In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially access other REST endpoints in the system arbitrarily.
- Source
- prodsec@splunk.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "285DAAE6-0931-41DA-A64A-25ED6A3BE2C5",
"versionEndExcluding": "8.1.14",
"versionStartIncluding": "8.1.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E924894C-6C74-4F3B-B8FC-B3FDA0F487F3",
"versionEndExcluding": "8.2.11",
"versionStartIncluding": "8.2.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4FF90BE2-6E2E-41F7-A77E-7547CBDD8596",
"versionEndExcluding": "9.0.5",
"versionStartIncluding": "9.0.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "97F2BD15-F25B-488B-B2AC-AD33239B4A27",
"versionEndExcluding": "9.0.2303.100"
}
],
"operator": "OR"
}
]
}
]