CVE-2023-22934

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.3 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
splunksplunk
8.1.0 ≤
𝑥
< 8.1.13
splunksplunk
8.2.0 ≤
𝑥
< 8.2.10
splunksplunk
9.0.0 ≤
𝑥
< 9.0.4
splunksplunk_cloud_platform
𝑥
< 9.0.2209.3
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
splunksplunk
8.1 ≤
𝑥
< 8.1.13
ADP
splunksplunk
8.2 ≤
𝑥
< 8.2.10
ADP
splunksplunk
9.0 ≤
𝑥
< 9.0.4
ADP
splunksplunk_cloud_platform
- ≤
𝑥
< 9.0.2209.3
ADP