QID 378601
Date Published: 2023-07-04
QID 378601: Splunk Enterprise Role-based Access Control (RBAC) Bypass Vulnerability (SVD-2023-0612)
An unauthorized user can access the /services/indexing/preview REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.
Affected Versions:
Splunk versions 8.1.0 to 8.1.13
Splunk versions 8.2.0 to 8.2.10
Splunk versions 9.0.0 to 9.0.4
QID Detection Logic(Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable.
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".
Successful exploit may allow an unauthorized user access to /services/indexing/preview REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.
Workaround:
Remove the edit_monitor and edit_upload_and_index capabilities from roles that low-privilege user accounts hold. Ensure that all REST endpoints have the proper access control lists (ACLs) applied to them.
- SVD-2023-0612 -
advisory.splunk.com/advisories/SVD-2023-0612
CVEs related to QID 378601
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SVD-2023-0612 |
|