CVE-2023-32706
- EPSS 0.22%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon.
CVE-2023-32707
- EPSS 82.47%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of...
CVE-2023-32708
- EPSS 0.15%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially ac...
CVE-2023-32709
- EPSS 0.16%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk inst...
CVE-2023-32710
- EPSS 0.28%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the ‘copyresults’ command if they know the...
CVE-2023-32711
- EPSS 0.37%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, a Splunk dashboard view lets a low-privileged user exploit a vulnerability in the Bootstrap web framework (CVE-2019-8331) and build a stored cross-site scripting (XSS) payload.
CVE-2023-32712
- EPSS 0.28%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:53
In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at wo...
CVE-2023-32714
- EPSS 32.58%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:54
In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation d...
CVE-2023-32716
- EPSS 0.21%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:54
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, an attacker can exploit a vulnerability in the {{dump}} SPL command to cause a denial of service by crashing the Splunk daemon.
CVE-2023-32717
- EPSS 0.12%
- Published 01.06.2023 17:15:10
- Last modified 21.11.2024 08:03:54
On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, an unauthorized user can access the {{/services/indexing/preview}} REST endpoint to overwrite search results if they know the sea...