Vulnerability Details CVE-2023-32708
In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially access other REST endpoints in the system arbitrarily.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.3%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2023-32708
-
cpe:2.3:a:splunk:splunk:8.1.0
-
cpe:2.3:a:splunk:splunk:8.1.1
-
cpe:2.3:a:splunk:splunk:8.1.12
-
cpe:2.3:a:splunk:splunk:8.1.13
-
cpe:2.3:a:splunk:splunk:8.1.2
-
cpe:2.3:a:splunk:splunk:8.1.4
-
cpe:2.3:a:splunk:splunk:8.1.5
-
cpe:2.3:a:splunk:splunk:8.1.6
-
cpe:2.3:a:splunk:splunk:8.1.7
-
cpe:2.3:a:splunk:splunk:8.2.0
-
cpe:2.3:a:splunk:splunk:8.2.10
-
cpe:2.3:a:splunk:splunk:8.2.9
-
cpe:2.3:a:splunk:splunk:9.0.0
-
cpe:2.3:a:splunk:splunk:9.0.3
-
cpe:2.3:a:splunk:splunk:9.0.4
-
cpe:2.3:a:splunk:splunk_cloud_platform:-
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.1.2103
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2105
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2106
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2107
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2109
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2111
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2112
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2201
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2202
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2203
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2209
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2209.3