In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-45151 In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Splunk

Published:

Updated: 2025-02-28T11:03:56.605Z

Reserved: 2023-08-16T22:07:52.838Z

Link: CVE-2023-40593

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-30T17:15:09.853

Modified: 2024-11-21T08:19:47.123

Link: CVE-2023-40593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses