Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f2x4-x646-23fg

Опубликовано: 07 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.8

Описание

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability edit_scripted and list_inputs capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.

See Define roles on the Splunk platform with capabilities and Setting up a scripted input for more information.

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability edit_scripted and list_inputs capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.

See Define roles on the Splunk platform with capabilities and Setting up a scripted input for more information.

EPSS

Процентиль: 14%
0.00046
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 6.8
nvd
7 месяцев назад

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability `edit_scripted` and `list_inputs` capability , could perform a remote command execution due to improper user input sanitization on the scripted input files.<br><br>See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) and [Setting up a scripted input ](https://docs.splunk.com/Documentation/Splunk/9.4.2/AdvancedDev/ScriptSetup)for more information.

CVSS3: 6.8
fstec
7 месяцев назад

Уязвимость платформы для операционного анализа Splunk Enterprise, связанная с непринятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 14%
0.00046
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-78