CVE-2023-22934
📋 TL;DR
This vulnerability allows authenticated Splunk users to bypass SPL safeguards for risky commands by crafting a saved search job that uses the 'pivot' command. When a higher-privileged user initiates this saved job via their browser, it can execute restricted commands. Affected are Splunk Enterprise deployments with versions below 8.1.13, 8.2.10, and 9.0.4.
💻 Affected Systems
- Splunk Enterprise
📦 What is this software?
Splunk by Splunk
Splunk by Splunk
Splunk by Splunk
⚠️ Risk & Real-World Impact
Worst Case
Privilege escalation leading to full system compromise, data exfiltration, or execution of arbitrary commands on the Splunk server.
Likely Case
Unauthorized data access, privilege escalation within Splunk, or execution of restricted SPL commands that could impact system performance.
If Mitigated
Limited impact due to proper access controls, monitoring, and network segmentation preventing lateral movement.
🎯 Exploit Status
Exploitation requires social engineering or tricking a privileged user into triggering the malicious saved search.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.1.13, 8.2.10, or 9.0.4
Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2023-0204
Restart Required: Yes
Instructions:
1. Backup Splunk configuration and data. 2. Download appropriate patched version from Splunk website. 3. Stop Splunk services. 4. Install update following Splunk upgrade documentation. 5. Restart Splunk services. 6. Verify version and functionality.
🔧 Temporary Workarounds
Restrict Saved Search Creation
allLimit which users can create saved searches to reduce attack surface.
Configure role-based access controls in Splunk to restrict 'write' permissions on saved searches.
Monitor Saved Search Activity
allImplement auditing of saved search creation and execution.
Enable Splunk audit logging and monitor for unusual saved search patterns.
🧯 If You Can't Patch
- Implement strict principle of least privilege for Splunk user accounts, ensuring only necessary users have saved search creation permissions.
- Segment Splunk deployment from critical systems and implement network controls to limit potential lateral movement.
🔍 How to Verify
Check if Vulnerable:
Check Splunk version via web interface (Settings > Server Info) or CLI. If version is below 8.1.13, 8.2.10, or 9.0.4, system is vulnerable.
Check Version:
$SPLUNK_HOME/bin/splunk version
Verify Fix Applied:
After patching, verify version is 8.1.13, 8.2.10, 9.0.4 or higher. Test that pivot commands in saved searches no longer bypass SPL safeguards.
📡 Detection & Monitoring
Log Indicators:
- Unusual saved search creation events
- Execution of typically restricted SPL commands via saved searches
- Failed attempts to bypass SPL safeguards
Network Indicators:
- Unusual outbound connections from Splunk server following saved search execution
SIEM Query:
index=_audit action="savedsearch" | search savedsearch_name="*" | stats count by user, savedsearch_name