- Description
- In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
- Source
- prodsec@splunk.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 5.7
- Impact score
- 3.6
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- nvd@nist.gov
- NVD-CWE-noinfo
- prodsec@splunk.com
- CWE-200
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "92689196-A27A-49A9-974D-9DAB239DA3F1",
"versionEndExcluding": "9.1.2308.207",
"versionStartIncluding": "9.1.2308"
},
{
"criteria": "cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D906AB2D-B882-4482-9A3B-53A01A28152A",
"versionEndExcluding": "9.1.2312.200",
"versionStartIncluding": "9.1.2312"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591",
"versionEndExcluding": "9.0.10",
"versionStartIncluding": "9.0.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE",
"versionEndExcluding": "9.1.5",
"versionStartIncluding": "9.1.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3",
"versionEndExcluding": "9.2.2",
"versionStartIncluding": "9.2.0"
}
],
"operator": "OR"
}
]
}
]