CVE-2023-32708
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/06/2023
Last modified:
10/04/2024
Description
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially access other REST endpoints in the system arbitrarily.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 8.1.0 (including) | 8.1.14 (excluding) |
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 8.2.0 (including) | 8.2.11 (excluding) |
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 9.0.0 (including) | 9.0.5 (excluding) |
| cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:* | 9.0.2303.100 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



