Splunk Releases Security Updates for Multiple Products
Security updates address vulnerabilities in Splunk Enterprise, Splunk Cloud, Splunk Universal Forwarders, Splunk App for Stream, and Splunk App for Lookup File Editing
Summary
Security updates address vulnerabilities in Splunk Enterprise, Splunk Cloud, Splunk Universal Forwarders, Splunk App for Stream, and Splunk App for Lookup File Editing
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Splunk has released twelve security advisories that address five high, six medium, and one low impact vulnerabilities within Splunk Enterprise, Splunk Cloud, Splunk Universal Forwarders, Splunk App for Stream, and Splunk App for Lookup File Editing. The high-severity vulnerabilities include vulnerabilities that could be exploited by an attacker to cause a denial-of-service condition, path traversal, or privilege escalation on a vulnerable system.
In addition to these security advisories, Splunk has also released Third-Party Bulletins that affect Splunk Cloud, Splunk Universal Forwarders, and Splunk Enterprise.
Remediation advice
Affected organisations are encouraged to review the following Splunk Security Advisories for more information.
Remediation steps
| Type | Step |
|---|---|
| Patch |
Role-based Access Control (RBAC) Bypass on '/services/indexing/preview' REST Endpoint Can Overwrite Search | SVD-2023-0612 https://advisory.splunk.com/advisories/SVD-2023-0612 |
| Patch |
Denial of Service via the 'dump' SPL command | SVD-2023-0611 https://advisory.splunk.com/advisories/SVD-2023-0611 |
| Patch |
Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing | SVD-2023-0610 https://advisory.splunk.com/advisories/SVD-2023-0610 |
| Patch |
Information Disclosure via the ‘copyresults’ SPL Command | SVD-2023-0609 https://advisory.splunk.com/advisories/SVD-2023-0609 |
| Patch |
Path Traversal in Splunk App for Lookup File Editing | SVD-2023-0608 https://advisory.splunk.com/advisories/SVD-2023-0608 |
| Patch |
Local Privilege Escalation via the ‘streamfwd’ program in Splunk App for Stream | SVD-2023-0607 https://advisory.splunk.com/advisories/SVD-2023-0607 |
| Patch |
Unauthenticated Log Injection on '/var/log/splunk/web_service.log' Log File | SVD-2023-0606 https://advisory.splunk.com/advisories/SVD-2023-0606 |
| Patch |
Persistent Cross-Site Scripting (XSS) through a URL Validation Bypass within a Dashboard View | SVD-2023-0605 https://advisory.splunk.com/advisories/SVD-2023-0605 |
| Patch |
Low-privileged User can View Hashed Default Splunk Password | SVD-2023-0604 https://advisory.splunk.com/advisories/SVD-2023-0604 |
| Patch |
HTTP Response Splitting via the ‘rest’ SPL Command | SVD-2023-0603 https://advisory.splunk.com/advisories/SVD-2023-0603 |
| Patch |
‘edit_user’ Capability Privilege Escalation | SVD-2023-0602 https://advisory.splunk.com/advisories/SVD-2023-0602 |
| Patch |
Denial Of Service due to Untrusted XML Tag in XML Parser within SAML Authentication | SVD-2023-0601 https://advisory.splunk.com/advisories/SVD-2023-0601 |
| Patch |
Third-Party Bulletins https://advisory.splunk.com/?301=/en_us/product-security.html |
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 6 June 2023 3:25 pm