In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0204 | vendor advisory |
https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd | exploit vendor advisory |