Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-22939


In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled.


Published

2023-02-14T18:15:12.687

Last Modified

2024-11-21T07:45:40.980

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application splunk splunk < 8.1.13 Yes
Application splunk splunk < 8.2.10 Yes
Application splunk splunk < 9.0.4 Yes
Application splunk splunk_cloud_platform < 9.0.2209.3 Yes

References