Логотип exploitDog
bind:CVE-2023-32712
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32712

Количество 3

Количество 3

nvd логотип

CVE-2023-32712

больше 2 лет назад

In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code execution in the vulnerable application. This attack requires a user to use a terminal application that supports the translation of ANSI escape codes to read the malicious log file locally in the vulnerable terminal, and to perform additional user interaction to exploit. Universal Forwarder versions 9.1.0.1, 9.0.5, 8.2.11, and lower can be vulnerable in situations where they have management services active and accessible over the network. Universal Forwarder versions 9.0.x and 9.1.x bind management services to the local machine and are not vulnerable in this specific configuration. See SVD-2022-0605 for more information. Universal Forwarder versions 9.1 use Unix Domain Sockets (UDS) for communication, which furt

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-v72v-m6vq-49vh

больше 2 лет назад

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an attacker can use a specially crafted web URL in their browser to cause log file poisoning. The attack requires the attacker to have secure shell (SSH) access to the instance and use a terminal program that supports a certain feature set to execute the attack successfully.

CVSS3: 3.4
EPSS: Низкий
fstec логотип

BDU:2023-08386

больше 2 лет назад

Уязвимость журнала веб-службы платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-32712

In Splunk Enterprise versions below 9.1.0.2, 9.0.5.1, and 8.2.11.2, an attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files that, when a vulnerable terminal application reads them, can potentially, at worst, result in possible code execution in the vulnerable application. This attack requires a user to use a terminal application that supports the translation of ANSI escape codes to read the malicious log file locally in the vulnerable terminal, and to perform additional user interaction to exploit. Universal Forwarder versions 9.1.0.1, 9.0.5, 8.2.11, and lower can be vulnerable in situations where they have management services active and accessible over the network. Universal Forwarder versions 9.0.x and 9.1.x bind management services to the local machine and are not vulnerable in this specific configuration. See SVD-2022-0605 for more information. Universal Forwarder versions 9.1 use Unix Domain Sockets (UDS) for communication, which furt

CVSS3: 8.6
0%
Низкий
больше 2 лет назад
github логотип
GHSA-v72v-m6vq-49vh

In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an attacker can use a specially crafted web URL in their browser to cause log file poisoning. The attack requires the attacker to have secure shell (SSH) access to the instance and use a terminal program that supports a certain feature set to execute the attack successfully.

CVSS3: 3.4
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-08386

Уязвимость журнала веб-службы платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.6
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу