8.8
CVSSv3

CVE-2023-46214

Published: 16/11/2023 Updated: 10/04/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

splunk cloud

splunk splunk

Vendor Advisories

Check Point Reference: CPAI-2023-1349 Date Published: 13 Dec 2023 Severity: High ...

Exploits

This Metasploit module exploits a remote code execution vulnerability in Splunk Enterprise The affected versions include 90x before 907 and 91x before 912 The exploitation process leverages a weakness in the XSLT transformation functionality of Splunk Successful exploitation requires valid credentials, typically admin:changeme by default ...

Github Repositories

Splunk RCE - PoC Proof of concept exploit for CVE-2023-46214, SVD-2023-1104 Usage The Splunk instance U