Unauthenticated Log Injection in Splunk Enterprise
CVE-2023-32712

8.6HIGH

Key Information:

Vendor
Splunk
Vendor
CVE Published:
1 June 2023

Summary

In certain versions of Splunk Enterprise and Universal Forwarder, an attacker can exploit a vulnerability that allows for injection of ANSI escape codes into log files. If these logs are read by a vulnerable terminal application, it may lead to potential code execution. This exploitation requires user interaction to read the manipulated log file locally and may vary based on the permissions set in the terminal application. While more recent version configurations mitigate this risk, it’s crucial for users to assess their system settings and log handling practices to prevent possible unauthorized access.

Affected Version(s)

Splunk Enterprise 8.2 < 8.2.11.2

Splunk Enterprise 9.0 < 9.0.5.1

Splunk Enterprise 9.1 < 9.1.0.2

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

STÖK / Fredrik Alexandersson
.