CVE-2023-22934

7.3 HIGH

📋 TL;DR

This vulnerability allows authenticated Splunk users to bypass SPL safeguards for risky commands by crafting a saved search job that uses the 'pivot' command. When a higher-privileged user initiates this saved job via their browser, it can execute restricted commands. Affected are Splunk Enterprise deployments with versions below 8.1.13, 8.2.10, and 9.0.4.

💻 Affected Systems

Products:
  • Splunk Enterprise
Versions: Versions below 8.1.13, 8.2.10, and 9.0.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires both an authenticated user to create the saved search and a higher-privileged user to trigger it via browser.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation leading to full system compromise, data exfiltration, or execution of arbitrary commands on the Splunk server.

🟠

Likely Case

Unauthorized data access, privilege escalation within Splunk, or execution of restricted SPL commands that could impact system performance.

🟢

If Mitigated

Limited impact due to proper access controls, monitoring, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering or tricking a privileged user into triggering the malicious saved search.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.13, 8.2.10, or 9.0.4

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2023-0204

Restart Required: Yes

Instructions:

1. Backup Splunk configuration and data. 2. Download appropriate patched version from Splunk website. 3. Stop Splunk services. 4. Install update following Splunk upgrade documentation. 5. Restart Splunk services. 6. Verify version and functionality.

🔧 Temporary Workarounds

Restrict Saved Search Creation

all

Limit which users can create saved searches to reduce attack surface.

Configure role-based access controls in Splunk to restrict 'write' permissions on saved searches.

Monitor Saved Search Activity

all

Implement auditing of saved search creation and execution.

Enable Splunk audit logging and monitor for unusual saved search patterns.

🧯 If You Can't Patch

  • Implement strict principle of least privilege for Splunk user accounts, ensuring only necessary users have saved search creation permissions.
  • Segment Splunk deployment from critical systems and implement network controls to limit potential lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check Splunk version via web interface (Settings > Server Info) or CLI. If version is below 8.1.13, 8.2.10, or 9.0.4, system is vulnerable.

Check Version:

$SPLUNK_HOME/bin/splunk version

Verify Fix Applied:

After patching, verify version is 8.1.13, 8.2.10, 9.0.4 or higher. Test that pivot commands in saved searches no longer bypass SPL safeguards.

📡 Detection & Monitoring

Log Indicators:

  • Unusual saved search creation events
  • Execution of typically restricted SPL commands via saved searches
  • Failed attempts to bypass SPL safeguards

Network Indicators:

  • Unusual outbound connections from Splunk server following saved search execution

SIEM Query:

index=_audit action="savedsearch" | search savedsearch_name="*" | stats count by user, savedsearch_name

🔗 References

📤 Share & Export