Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Splunk | Splunk Enterprise | 8.1 ~ 8.1.13 | - | |
| Splunk | Splunk Cloud Platform | - ~ 9.0.2212 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted ‘INGEST_EVAL’ parameter in a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) crashes the Splunk daemon (splunkd). CVE project by @Sn0wAlice | https://github.com/eduardosantos1989/CVE-2023-22941 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-22935 | 8.1 HIGH | SPL Command Safeguards Bypass via the ‘display.page.search.patterns.sensitivity’ Search Pa |
| CVE-2023-22939 | 8.1 HIGH | SPL Command Safeguards Bypass via the ‘map’ SPL Command in Splunk Enterprise |
| CVE-2023-22932 | 8.0 HIGH | Persistent Cross-Site Scripting through a Base64-encoded Image in a View in Splunk Enterpr |
| CVE-2023-22933 | 8.0 HIGH | Persistent Cross-Site Scripting through the ‘module’ Tag in a View in Splunk Enterprise |
| CVE-2023-22934 | 7.3 HIGH | SPL Command Safeguards Bypass via the ‘pivot’ SPL Command in Splunk Enterprise |
| CVE-2023-22936 | 6.3 MEDIUM | Authenticated Blind Server Side Request Forgery via the ‘search_listener’ Search Parameter |
| CVE-2023-22940 | 6.3 MEDIUM | SPL Command Safeguards Bypass via the ‘collect’ SPL Command Aliases in Splunk Enterprise |
| CVE-2023-22942 | 5.4 MEDIUM | Cross-Site Request Forgery in the ‘ssg/kvstore_client’ REST Endpoint in Splunk Enterprise |
| CVE-2023-22943 | 4.8 MEDIUM | Modular Input REST API Requests Connect via HTTP after Certificate Validation Failure in S |
| CVE-2023-22931 | 4.3 MEDIUM | ‘createrss’ External Search Command Overwrites Existing RSS Feeds in Splunk Enterprise |
| CVE-2023-22937 | 4.3 MEDIUM | Unnecessary File Extensions Allowed by Lookup Table Uploads in Splunk Enterprise |
| CVE-2023-22938 | 4.3 MEDIUM | Permissions Validation Failure in the ‘sendemail’ REST API Endpoint in Splunk Enterprise |
No comments yet