cve/2023/CVE-2023-46214.md

30 lines
1.6 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-46214](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46214)
![](https://img.shields.io/static/v1?label=Product&message=Splunk%20Cloud&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Splunk%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=-%3C%209.1.2308%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.0%3C%209.0.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=The%20software%20does%20not%20properly%20neutralize%20special%20elements%20that%20are%20used%20in%20XML%2C%20allowing%20attackers%20to%20modify%20the%20syntax%2C%20content%2C%20or%20commands%20of%20the%20XML%20before%20it%20is%20processed%20by%20an%20end%20system.&color=brighgreen)
### Description
In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/AdamCrosser/awesome-vuln-writeups
2024-07-25 21:25:12 +00:00
- https://github.com/Chocapikk/Chocapikk
2024-05-25 21:48:12 +02:00
- https://github.com/Marco-zcl/POC
2024-07-25 21:25:12 +00:00
- https://github.com/TrojanAZhen/Self_Back
2024-05-25 21:48:12 +02:00
- https://github.com/UNC1739/awesome-vulnerability-research
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/nathan31337/Splunk-RCE-poc
- https://github.com/tanjiti/sec_profile
2024-05-28 08:49:17 +00:00
- https://github.com/wjlin0/poc-doc
2024-05-25 21:48:12 +02:00
- https://github.com/wy876/POC
- https://github.com/xingchennb/POC-