Описание
In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-46214
- https://advisory.splunk.com/advisories/SVD-2023-1104
- https://research.splunk.com/application/6cb7e011-55fb-48e3-a98d-164fa854e37e
- https://research.splunk.com/application/a053e6a6-2146-483a-9798-2d43652f3299
- http://packetstormsecurity.com/files/176154/Splunk-XSLT-Upload-Remote-Code-Execution.html
Связанные уязвимости
In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
Уязвимость платформы для операционного анализа Splunk Enterprise, связанная с ошибками в обработке XML-запросов, позволяющая нарушителю выполнить произвольный код