Total vulnerabilities in the database
In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance.
Software | From | Fixed in |
---|---|---|
splunk / splunk | 9.0.0 | 9.0.6 |
splunk / splunk | - | 8.2.12 |
splunk / splunk | 9.1.0 | 9.1.1 |
splunk / splunk_cloud_platform | - | 9.0.2305.200 |