CVE-2023-46214

In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*

History

24 Nov 2023, 23:07

Type Values Removed Values Added
References () https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e/ - () https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e/ - Vendor Advisory
References () https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299/ - () https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299/ - Vendor Advisory
References () https://advisory.splunk.com/advisories/SVD-2023-1104 - () https://advisory.splunk.com/advisories/SVD-2023-1104 - Vendor Advisory
CWE CWE-91
First Time Splunk
Splunk splunk
Splunk cloud
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

23 Nov 2023, 01:15

Type Values Removed Values Added
References
  • () https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e/ -

20 Nov 2023, 21:15

Type Values Removed Values Added
References
  • () https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299/ -

16 Nov 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-16 21:15

Updated : 2024-04-10 01:15


NVD link : CVE-2023-46214

Mitre link : CVE-2023-46214


JSON object : View

Products Affected

splunk

  • cloud
  • splunk
CWE
CWE-91

XML Injection (aka Blind XPath Injection)