In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser.
2023-02-14T18:15:12.297
2024-11-21T07:45:40.297
Modified
CVSSv3.1: 7.3 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | splunk | splunk | < 8.1.13 | Yes |
| Application | splunk | splunk | < 8.2.10 | Yes |
| Application | splunk | splunk | < 9.0.4 | Yes |
| Application | splunk | splunk_cloud_platform | < 9.0.2209.3 | Yes |