In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0607 | Vendor Advisory |
https://advisory.splunk.com/advisories/SVD-2023-0607 | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisory.splunk.com/advisories/SVD-2023-0607 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
07 Jun 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
CWE | CWE-269 | |
References | (MISC) https://advisory.splunk.com/advisories/SVD-2023-0607 - Vendor Advisory | |
CPE | cpe:2.3:a:splunk:splunk_app_for_stream:*:*:*:*:*:*:*:* |
01 Jun 2023, 17:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 17:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32713
Mitre link : CVE-2023-32713
CVE.ORG link : CVE-2023-32713
JSON object : View
Products Affected
splunk
- splunk_app_for_stream
CWE
CWE-269
Improper Privilege Management