In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled.
2023-02-14T18:15:12.687
2024-11-21T07:45:40.980
Modified
CVSSv3.1: 8.1 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | splunk | splunk | < 8.1.13 | Yes |
| Application | splunk | splunk | < 8.2.10 | Yes |
| Application | splunk | splunk | < 9.0.4 | Yes |
| Application | splunk | splunk_cloud_platform | < 9.0.2209.3 | Yes |