Overview
- Description
- Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action.
- Source
- prodsec@splunk.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:soar:*:*:*:*:on-premises:*:*:*", "vulnerable": true, "matchCriteriaId": "B6409239-52FB-4299-8AA1-869223F44504", "versionEndExcluding": "6.1.0" }, { "criteria": "cpe:2.3:a:splunk:soar:*:*:*:*:cloud:*:*:*", "vulnerable": true, "matchCriteriaId": "E71AB766-6388-44FB-8F0B-6ED443A20895", "versionEndExcluding": "6.1.0.131" } ], "operator": "OR" } ] } ]