‘edit_user’ Capability Privilege Escalation
CVE-2023-32707
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 1 June 2023
Badges
Summary
In specific versions of Splunk Enterprise and Splunk Cloud Platform, a vulnerability exists that allows users with low privileges who possess the 'edit_user' capability to escalate their privileges to that of an admin. By sending crafted web requests, these users can gain unauthorized access to administrative functions, potentially compromising the security and integrity of the system. Immediate updates to the latest software versions are recommended to mitigate this risk.
Affected Version(s)
Splunk Cloud Platform - < 9.0.2303.100
Splunk Enterprise 8.1 < 8.1.14
Splunk Enterprise 8.2 < 8.2.11
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
88% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved