CVE-2023-22934
14.02.2023, 18:15
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| splunk | splunk | 8.1.0 ≤ 𝑥 < 8.1.13 |
| splunk | splunk | 8.2.0 ≤ 𝑥 < 8.2.10 |
| splunk | splunk | 9.0.0 ≤ 𝑥 < 9.0.4 |
| splunk | splunk_cloud_platform | 𝑥 < 9.0.2209.3 |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| splunk | splunk | 8.1 ≤ 𝑥 < 8.1.13 | ADP |
| splunk | splunk | 8.2 ≤ 𝑥 < 8.2.10 | ADP |
| splunk | splunk | 9.0 ≤ 𝑥 < 9.0.4 | ADP |
| splunk | splunk_cloud_platform | - ≤ 𝑥 < 9.0.2209.3 | ADP |
Common Weakness Enumeration