HTTP Response Splitting via the ‘rest’ SPL Command
CVE-2023-32708
7.2HIGH
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 1 June 2023
Summary
In certain versions of Splunk Enterprise and Splunk Cloud Platform, low-privileged users may exploit an HTTP response splitting vulnerability. By using the ‘rest’ SPL command, these users can inadvertently manipulate HTTP responses, potentially gaining unauthorized access to REST endpoints within the system. This flaw affects various versions of Splunk products, emphasizing the importance of implementing security measures and applying updates promptly to mitigate risk.
Affected Version(s)
Splunk Cloud Platform - < 9.0.2303.100
Splunk Enterprise 8.1 < 8.1.14
Splunk Enterprise 8.2 < 8.2.11
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Danylo Dmytriiev (DDV_UA)