In Splunk Enterprise versions below 9.4.4, 9.3.6, and 9.2.8, and Splunk Cloud Platform versions below 9.3.2411.108, 9.3.2408.118 and 9.2.2406.123, a low privilege user that does not hold the admin or power Splunk roles could perform an extensible markup language (XML) external entity (XXE) injection through the dashboard tab label field. The XXE injection has the potential to cause denial of service (DoS) attacks.
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Splunk | Splunk | 9.2.0 (including) | 9.2.8 (excluding) |
Splunk | Splunk | 9.3.0 (including) | 9.3.6 (excluding) |
Splunk | Splunk | 9.4.0 (including) | 9.4.4 (excluding) |
Splunk_cloud_platform | Splunk | 9.2.2406 (including) | 9.2.2406.123 (excluding) |
Splunk_cloud_platform | Splunk | 9.3.2408 (including) | 9.3.2408.118 (excluding) |
Splunk_cloud_platform | Splunk | 9.3.2411 (including) | 9.3.2411.108 (excluding) |