In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0602 | vendor advisory |
https://research.splunk.com/application/39e1c326-67d7-4c0d-8584-8056354f6593/ | vendor advisory |