Skip to main content

Splunk Releases Security Updates for Multiple Products

Security updates address vulnerabilities in Splunk Enterprise, Splunk Cloud, Splunk Universal Forwarders, Splunk App for Stream, and Splunk App for Lookup File Editing

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Security updates address vulnerabilities in Splunk Enterprise, Splunk Cloud, Splunk Universal Forwarders, Splunk App for Stream, and Splunk App for Lookup File Editing


Threat details

Introduction

Splunk has released twelve security advisories that address five high, six medium, and one low impact vulnerabilities within Splunk Enterprise, Splunk Cloud, Splunk Universal Forwarders, Splunk App for Stream, and Splunk App for Lookup File Editing.  The high-severity vulnerabilities include vulnerabilities that could be exploited by an attacker to cause a denial-of-service condition, path traversal, or privilege escalation on a vulnerable system. 

In addition to these security advisories, Splunk has also released Third-Party Bulletins that affect Splunk Cloud, Splunk Universal Forwarders, and Splunk Enterprise.


Remediation advice

Affected organisations are encouraged to review the following Splunk Security Advisories for more information.


Remediation steps

Type Step
Patch

Role-based Access Control (RBAC) Bypass on '/services/indexing/preview' REST Endpoint Can Overwrite Search | SVD-2023-0612


https://advisory.splunk.com/advisories/SVD-2023-0612
Patch

Denial of Service via the 'dump' SPL command |  SVD-2023-0611


https://advisory.splunk.com/advisories/SVD-2023-0611
Patch

Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing | SVD-2023-0610


https://advisory.splunk.com/advisories/SVD-2023-0610
Patch

Information Disclosure via the ‘copyresults’ SPL Command | SVD-2023-0609


https://advisory.splunk.com/advisories/SVD-2023-0609
Patch

Path Traversal in Splunk App for Lookup File Editing | SVD-2023-0608


https://advisory.splunk.com/advisories/SVD-2023-0608
Patch

Local Privilege Escalation via the ‘streamfwd’ program in Splunk App for Stream | SVD-2023-0607


https://advisory.splunk.com/advisories/SVD-2023-0607
Patch

Unauthenticated Log Injection on '/var/log/splunk/web_service.log' Log File | SVD-2023-0606


https://advisory.splunk.com/advisories/SVD-2023-0606
Patch

Persistent Cross-Site Scripting (XSS) through a URL Validation Bypass within a Dashboard View | SVD-2023-0605


https://advisory.splunk.com/advisories/SVD-2023-0605
Patch

Low-privileged User can View Hashed Default Splunk Password | SVD-2023-0604


https://advisory.splunk.com/advisories/SVD-2023-0604
Patch

HTTP Response Splitting via the ‘rest’ SPL Command | SVD-2023-0603


https://advisory.splunk.com/advisories/SVD-2023-0603
Patch

‘edit_user’ Capability Privilege Escalation | SVD-2023-0602


https://advisory.splunk.com/advisories/SVD-2023-0602
Patch

Denial Of Service due to Untrusted XML Tag in XML Parser within SAML Authentication | SVD-2023-0601


https://advisory.splunk.com/advisories/SVD-2023-0601
Patch

Third-Party Bulletins


https://advisory.splunk.com/?301=/en_us/product-security.html

Definitive source of threat updates


CVE Vulnerabilities

Last edited: 6 June 2023 3:25 pm