SB2023090417 - Multiple vulnerabilities in Splunk Enterprise 



SB2023090417 - Multiple vulnerabilities in Splunk Enterprise

Published: September 4, 2023

Security Bulletin ID SB2023090417
Severity
Medium
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 57% Low 43%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Untrusted search path (CVE-ID: CVE-2023-40596)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to usage of an untrusted search path for the OPENSSLDIR build definition. A local user can place a malicious dynamic library file (.dll) into a specific location on the system and execute arbitrary code with escalated privileges.

The vulnerability affects Windows installations only.


2) Absolute Path Traversal (CVE-ID: CVE-2023-40597)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the runshellscript.py script. A local user can run a script in the root directory of another disk on the machine and execute arbitrary code.


3) OS Command Injection (CVE-ID: CVE-2023-40598)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote user can create an external lookup that calls a legacy internal function and execute arbitrary OS commands on the target system.



4) Deserialization of Untrusted Data (CVE-ID: CVE-2023-40595)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within the "collect" SPL command. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Resource exhaustion (CVE-ID: CVE-2023-40594)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A local user can use the ‘printf’ SPL function to perform a denial of service (DoS).


6) Cross-site scripting (CVE-ID: CVE-2023-40592)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data passed to the "/app/search/table" web endpoint. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


7) Resource exhaustion (CVE-ID: CVE-2023-40593)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when processing SAML requests. A remote user can send a malformed SAML request to the "/saml/acs" REST endpoint to trigger resource exhaustion and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.