QID 378601

Date Published: 2023-07-04

QID 378601: Splunk Enterprise Role-based Access Control (RBAC) Bypass Vulnerability (SVD-2023-0612)

An unauthorized user can access the /services/indexing/preview REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

Affected Versions:
Splunk versions 8.1.0 to 8.1.13
Splunk versions 8.2.0 to 8.2.10
Splunk versions 9.0.0 to 9.0.4

QID Detection Logic(Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable.
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".

Successful exploit may allow an unauthorized user access to /services/indexing/preview REST endpoint to overwrite search results if they know the search ID (SID) of an existing search job.

  • CVSS V3 rated as Medium - 4.3 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2023-0612 for more details.

    Workaround:
    Remove the edit_monitor and edit_upload_and_index capabilities from roles that low-privilege user accounts hold. Ensure that all REST endpoints have the proper access control lists (ACLs) applied to them.

    Vendor References

    CVEs related to QID 378601

    Software Advisories
    Advisory ID Software Component Link
    SVD-2023-0612 URL Logo advisory.splunk.com/advisories/SVD-2023-0612