Unauthenticated Log Injection In Splunk SOAR
CVE-2023-3997

8.6HIGH

Key Information:

Vendor
Splunk
Vendor
CVE Published:
31 July 2023

Summary

Splunk SOAR prior to version 6.1.0 is vulnerable to a log file poisoning attack. An attacker can exploit this vulnerability by sending a specially crafted web request containing specific ANSI characters. This can lead to the manipulation of log files, affecting terminal users who attempt to view these compromised logs. As a result, terminal users may inadvertently execute malicious code, posing significant risks to the security and integrity of the system. Users are encouraged to upgrade to the latest version to mitigate these risks. For more detailed information, please refer to the Splunk advisory.

Affected Version(s)

Splunk SOAR (Cloud) - < 6.1.0

Splunk SOAR (On-premises) - < 6.1.0

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

STÖK / Fredrik Alexandersson
.