First published: Wed Aug 30 2023(Updated: )
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.2.0<8.2.12 | |
Splunk Splunk | >=9.0.0<9.0.6 | |
Splunk Splunk | =9.1.0 | |
Splunk Splunk Cloud Platform | <=9.0.2305.100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40597 is high with a severity value of 8.8.
Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1 are affected by CVE-2023-40597.
Yes, an attacker can exploit CVE-2023-40597 to execute arbitrary code located on a separate disk.
Yes, Splunk Cloud Platform up to version 9.0.2305.100 is affected by CVE-2023-40597.
To fix CVE-2023-40597, you should upgrade your Splunk Enterprise to version 8.2.12, 9.0.6, or 9.1.1, or upgrade Splunk Cloud Platform to a version higher than 9.0.2305.100.