Splunk Enterprise Vulnerability: Remote Code Execution via Malicious XSLT
CVE-2023-46214

8HIGH

Key Information:

Vendor
Splunk
Vendor
CVE Published:
16 November 2023

Badges

👾 Exploit Exists🟣 EPSS 17%📰 News Worthy

Summary

The CVE-2023-46214 vulnerability affects Splunk Enterprise versions below 9.0.7 and 9.1.2, allowing attackers to execute remote code by uploading malicious XSLT. A proof-of-concept exploit has been made public, prompting users to apply patches or workarounds provided by Splunk to mitigate the risk. There are no known exploitations in the wild by ransomware groups at this time.

Affected Version(s)

Splunk Cloud - < 9.1.2308

Splunk Enterprise 9.0 < 9.0.7

Splunk Enterprise 9.1 < 9.1.2

News Articles

PoC for Splunk Enterprise RCE flaw released (CVE-2023-46214)

A proof-of-concept exploit for a high-severity vulnerability in Splunk Enterprise has been made public. The flaw, identified as CVE-2023-46214, allows attackers to execute remote code by uploading malicious extensible stylesheet language transformations (XSLT). The affected versions include Splunk E...

9 months ago

Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens - Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability disclosure: Legal risks and ethical

1 year ago

CVE-2023-46214: the Splunk Remote Code Execution (RCE) Vulnerability

Take a deep dive into the critical CVE-2023-46214 RCE vulnerability in Splunk, learn about its exploitation & find out how to stay secure.

1 year ago

References

EPSS Score

17% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by blog.hrncirik.net

  • Vulnerability published

  • Vulnerability Reserved

Credit

Alex Hordijk
.