In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0602 | Vendor Advisory |
https://research.splunk.com/application/39e1c326-67d7-4c0d-8584-8056354f6593/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-01 17:15
Updated : 2024-04-10 01:15
NVD link : CVE-2023-32707
Mitre link : CVE-2023-32707
CVE.ORG link : CVE-2023-32707
JSON object : View
Products Affected
splunk
- splunk
- splunk_cloud_platform
CWE