Unauthenticated Log Injection In Splunk SOAR
CVE-2023-3997
8.6HIGH
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 31 July 2023
Summary
Splunk SOAR prior to version 6.1.0 is vulnerable to a log file poisoning attack. An attacker can exploit this vulnerability by sending a specially crafted web request containing specific ANSI characters. This can lead to the manipulation of log files, affecting terminal users who attempt to view these compromised logs. As a result, terminal users may inadvertently execute malicious code, posing significant risks to the security and integrity of the system. Users are encouraged to upgrade to the latest version to mitigate these risks. For more detailed information, please refer to the Splunk advisory.
Affected Version(s)
Splunk SOAR (Cloud) - < 6.1.0
Splunk SOAR (On-premises) - < 6.1.0
References
CVSS V3.1
Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
STÖK / Fredrik Alexandersson