QID 378614

Date Published: 2023-06-29

QID 378614: Splunk Enterprise Unauthenticated Log Injection Vulnerability (SVD-2023-0606)

Splunk Enterprise captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations.

CVE-2023-32708: A low-privileged user can trigger an HTTP response splitting vulnerability with the 'rest' SPL command that lets them potentially access other REST endpoints in the system arbitrarily, including viewing restricted content.

Affected Versions:
Splunk Enterprise versions from 8.1.0 prior to 8.1.14
Splunk Enterprise versions from 8.2.0 prior to 8.2.11
Splunk Enterprise versions from 9.0.0 prior to 9.0.5

QID Detection Logic(Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable along with splunk web configuration check using "/etc/system/default/limit.conf" or "/etc/system/local/limit.conf".

Successful exploitation of this vulnerability can use a specially crafted web URL in their browser to cause log file injection

  • CVSS V3 rated as Medium - 3.1 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2023-0606 for more details.

    Workaround:
    Do not use a terminal program that can send ANSI escape codes to access a Splunk Enterprise instance.

    Vendor References

    CVEs related to QID 378614

    Software Advisories
    Advisory ID Software Component Link
    SVD-2023-0606 URL Logo advisory.splunk.com/advisories/SVD-2023-0606