Vulnerability Details CVE-2023-32707
In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.824
EPSS Ranking 99.2%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-32707
-
cpe:2.3:a:splunk:splunk:8.1.0
-
cpe:2.3:a:splunk:splunk:8.1.1
-
cpe:2.3:a:splunk:splunk:8.1.12
-
cpe:2.3:a:splunk:splunk:8.1.13
-
cpe:2.3:a:splunk:splunk:8.1.2
-
cpe:2.3:a:splunk:splunk:8.1.4
-
cpe:2.3:a:splunk:splunk:8.1.5
-
cpe:2.3:a:splunk:splunk:8.1.6
-
cpe:2.3:a:splunk:splunk:8.1.7
-
cpe:2.3:a:splunk:splunk:8.2.0
-
cpe:2.3:a:splunk:splunk:8.2.10
-
cpe:2.3:a:splunk:splunk:8.2.9
-
cpe:2.3:a:splunk:splunk:9.0.0
-
cpe:2.3:a:splunk:splunk:9.0.3
-
cpe:2.3:a:splunk:splunk:9.0.4
-
cpe:2.3:a:splunk:splunk_cloud_platform:-
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.1.2103
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2105
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2106
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2107
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2109
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2111
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2112
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2201
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2202
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2203
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2209
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2209.3