First published: Wed Aug 30 2023(Updated: )
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.2.0<8.2.12 | |
Splunk Splunk | >=9.0.0<9.0.6 | |
Splunk Splunk | =9.1.0 | |
Splunk Splunk Cloud Platform | <=9.0.2305.100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40595 is critical.
Versions lower than 8.2.12, 9.0.6, and 9.1.1 of Splunk Enterprise are affected by CVE-2023-40595.
An attacker can exploit CVE-2023-40595 by executing a specially crafted query to serialize untrusted data and execute arbitrary code.
Yes, the Splunk Cloud Platform is affected by CVE-2023-40595.
To fix CVE-2023-40595, upgrade to Splunk Enterprise versions 8.2.12, 9.0.6, or 9.1.1, depending on your current version.