CVE-2023-22939: SPL Command Safeguards Bypass via the ‘map’ SPL Command in Splunk Enterprise

8.1 CVSS

Description

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled.

Classification

CVE ID: CVE-2023-22939

CVSS Base Severity: HIGH

CVSS Base Score: 8.1

Affected Products

Vendor: Splunk

Product: Splunk Enterprise

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.22% (probability of being exploited)

EPSS Percentile: 60.3% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://advisory.splunk.com/advisories/SVD-2023-0209
https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd

Timeline