Improper Output Neutralization for Logs in Splunk Enterprise - CVE-2023-32712

 

Improper Output Neutralization for Logs in Splunk Enterprise - CVE-2023-32712

Published: June 5, 2023


Vulnerability identifier: #VU76920
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-32712
CWE-ID: CWE-117
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Splunk Enterprise
Software vendor:
Splunk Inc.

Description

The vulnerability allows a remote attacker to alter log files.

The vulnerability exists due to improper input validation. A remote attacker can use a specially crafted web URL in their browser to cause log file injection, in which the attack inserts American National Standards Institute (ANSI) escape codes into specific files using a terminal program that supports those escape codes.

The attack requires a terminal program that supports the translation of ANSI escape codes and requires additional user interaction to successfully execute.


Remediation

Install updates from vendor's website.

External links