1/6/2023
30/10/2024
CVE-2023-32710: Information Disclosure via the ‘copyresults’ SPL Command
First published: Thu Jun 01 2023(Updated: )
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and in Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can perform an unauthorized transfer of data from a search using the ‘copyresults’ command if they know the search ID (SID) of a search job that has recently run.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|
Splunk Splunk | >=8.1.0<8.1.14 | |
Splunk Splunk | >=8.2.0<8.2.11 | |
Splunk Splunk | >=9.0.0<9.0.5 | |
Splunk Splunk Cloud Platform | <9.0.2303.100 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the vulnerability ID for this Splunk vulnerability?
The vulnerability ID for this Splunk vulnerability is CVE-2023-32710.
What versions of Splunk Enterprise are affected by this vulnerability?
Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14 are affected by this vulnerability.
What versions of Splunk Cloud Platform are affected by this vulnerability?
Splunk Cloud Platform versions below 9.0.2303.100 are affected by this vulnerability.
What can a low-privileged user do with this vulnerability?
A low-privileged user can perform an unauthorized transfer of data from a search using the 'copyresults' command if they know the search ID (SID) of a search job that has recently completed.
What is the severity of this vulnerability?
The severity of this vulnerability is medium with a CVSS score of 5.3.
How can I fix this vulnerability in Splunk Enterprise?
To fix this vulnerability in Splunk Enterprise, upgrade to version 9.0.5, 8.2.11, or 8.1.14.
How can I fix this vulnerability in Splunk Cloud Platform?
To fix this vulnerability in Splunk Cloud Platform, upgrade to version 9.0.2303.100.
Where can I find more information about this vulnerability?
You can find more information about this vulnerability on the Splunk Advisory website: https://advisory.splunk.com/advisories/SVD-2023-0609
- collector/nvd-latest
- collector/nvd-index
- agent/type
- agent/first-publish-date
- agent/softwarecombine
- agent/author
- agent/references
- agent/title
- agent/weakness
- agent/tags
- agent/severity
- agent/description
- agent/event
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- vendor/splunk
- canonical/splunk splunk
- version/splunk splunk/8.1.0
- version/splunk splunk/8.2.0
- version/splunk splunk/9.0.0
- canonical/splunk splunk cloud platform
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203