QID 378602

Date Published: 2023-07-04

QID 378602: Splunk Enterprise Persistent Cross-Site Scripting (XSS) Vulnerability (SVD-2023-0605)

A Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.

Affected Versions:
Splunk versions 8.1.0 to 8.1.13
Splunk versions 8.2.0 to 8.2.10
Splunk versions 9.0.0 to 9.0.4

QID Detection Logic(Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise along with the workaround in place or not. from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable.
Windows: Checks for installed vulnerable version of Splunk along with the workaround in place or not. from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".

Successful exploit may allow a low-privileged user build a stored cross-site scripting (XSS) payload.

  • CVSS V3 rated as Medium - 5.4 severity.
  • CVSS V2 rated as Medium - 5.5 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2023-0605 for more details.

    Workaround:
    If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers.

    Vendor References

    CVEs related to QID 378602

    Software Advisories
    Advisory ID Software Component Link
    SVD-2023-0605 URL Logo advisory.splunk.com/advisories/SVD-2023-0605