Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0702 |
History
Tue, 15 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action. | Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action. |
MITRE
Status: PUBLISHED
Assigner: Splunk
Published: 2023-07-31T16:16:19.911Z
Updated: 2024-10-30T15:05:45.232Z
Reserved: 2023-07-28T17:28:28.614Z
Link: CVE-2023-3997
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-07-31T17:15:10.110
Modified: 2024-11-21T08:18:29.740
Link: CVE-2023-3997
Redhat
No data.