Risky Commands Safeguards Bypass through preloaded Data Models due to Path Traversal vulnerability in Splunk Enterprise
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.
Problem Types
| Type | CWE ID | Description |
|---|
| cwe | CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Type: cwe
Description: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 3.1 | 3.5 | LOW | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
Version: 3.1
Base score: 3.5
Base severity: LOW
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N