In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.6, and 9.3.2411.117.125, an unauthenticated attacker can inject American National Standards Institute (ANSI) escape codes into Splunk log files due to improper validation at the /en-US/static/ web endpoint. This may allow them to poison, forge, or obfuscate sensitive log data through specially crafted HTTP requests, potentially impacting log integrity and detection capabilities.
The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Splunk | Splunk | 9.2.0 (including) | 9.2.10 (excluding) |
| Splunk | Splunk | 9.3.0 (including) | 9.3.8 (excluding) |
| Splunk | Splunk | 9.4.0 (including) | 9.4.6 (excluding) |
| Splunk | Splunk | 10.0.0 (including) | 10.0.0 (including) |
| Splunk_cloud_platform | Splunk | 9.3.2411 (including) | 9.3.2411.117 (excluding) |
| Splunk_cloud_platform | Splunk | 10.0.2503 (including) | 10.0.2503.6 (excluding) |
| Splunk_cloud_platform | Splunk | 10.1.2507 (including) | 10.1.2507.4 (excluding) |