CVE-2023-32713

In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:splunk:splunk_app_for_stream:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://advisory.splunk.com/advisories/SVD-2023-0607 - Vendor Advisory () https://advisory.splunk.com/advisories/SVD-2023-0607 - Vendor Advisory
CVSS v2 : unknown
v3 : 9.9
v2 : unknown
v3 : 7.8

07 Jun 2023, 14:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.9
CWE CWE-269
References (MISC) https://advisory.splunk.com/advisories/SVD-2023-0607 - (MISC) https://advisory.splunk.com/advisories/SVD-2023-0607 - Vendor Advisory
CPE cpe:2.3:a:splunk:splunk_app_for_stream:*:*:*:*:*:*:*:*

01 Jun 2023, 17:29

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 17:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32713

Mitre link : CVE-2023-32713

CVE.ORG link : CVE-2023-32713


JSON object : View

Products Affected

splunk

  • splunk_app_for_stream
CWE
CWE-269

Improper Privilege Management