CVE-2023-32707
HIGHSplunk Enterprise <9.0.5 - Privilege Escalation
Title source: llmDescription
In versions of Splunk Enterprise below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform below version 9.0.2303.100, a low-privileged user who holds a role that has the ‘edit_user’ capability assigned to it can escalate their privileges to that of the admin user by providing specially crafted web requests.
Exploits (3)
exploitdb
WORKING POC
by Redway Security · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51747
metasploit
WORKING POC
EXCELLENT
by Mr Hack (try_to_hack) Santiago Lopez, Heyder Andrade, Redway Security <redwaysecurity.com> · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/splunk_privilege_escalation_cve_2023_32707.rb
Scores
CVSS v3
8.8
EPSS
0.8268
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-285
Status
published
Products (2)
splunk/splunk
8.1.0 - 8.1.14
splunk/splunk_cloud_platform
< 9.0.2303.100
Published
Jun 01, 2023
Tracked Since
Feb 18, 2026