QID 379050

Date Published: 2023-11-21

QID 379050: Splunk Enterprise Multiple Vulnerabilities (SVD-2023-1104,SVD-2023-1105)

Splunk software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.

Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in Splunk Enterprise.

Affected Versions:
Splunk Enterprise versions from 9.0.0 prior to 9.0.7
Splunk Enterprise versions from 9.1.0 prior to 9.1.2

QID Detection Logic:

QID Detection Logic(Authenticated)
Linux: Checks for installed vulnerable version of Splunk Enterprise from "/etc/splunk.version" file either in "/opt/splunk" directory or using "$SPLUNK_HOME" environment variable.
Windows: Checks for installed vulnerable version of Splunk from "/etc/splunk.version" file using registry "HKLM\SYSTEM\CurrentControlSet\Services\Splunkd".

Successful exploitation of this vulnerability may allow an attacker to upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Vendor has released updated versions to fix these vulnerabilities. Please refer SVD-2023-1104,SVD-2023-1105 for more details.

    Software Advisories
    Advisory ID Software Component Link
    SVD-2023-1104 URL Logo advisory.splunk.com/advisories/SVD-2023-1104
    SVD-2023-1105 URL Logo advisory.splunk.com/advisories/SVD-2023-1105