In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-1104 | Vendor Advisory |
https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e/ | Vendor Advisory |
https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-11-16 21:15
Updated : 2024-04-10 01:15
NVD link : CVE-2023-46214
Mitre link : CVE-2023-46214
CVE.ORG link : CVE-2023-46214
JSON object : View
Products Affected
splunk
- splunk
- cloud
CWE
CWE-91
XML Injection (aka Blind XPath Injection)