In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user can trigger an HTTP response splitting vulnerability with the ‘rest’ SPL command that lets them potentially access other REST endpoints in the system arbitrarily.
Published 2023-06-01 17:15:10
Updated 2023-06-07 14:28:24
Source Splunk Inc.
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2023-32708

0.13%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-32708

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
8.8
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.8
5.9
NIST
7.2
HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1.2
5.9
Splunk Inc.

CWE ids for CVE-2023-32708

  • Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2023-32708

Products affected by CVE-2023-32708

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!