Unsanitized XSLT Input Allows Remote Code Execution in Splunk Enterprise

Unsanitized XSLT Input Allows Remote Code Execution in Splunk Enterprise

CVE-2023-46214 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

In Splunk Enterprise versions below 9.0.7 and 9.1.2, Splunk Enterprise does not safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This means that an attacker can upload malicious XSLT which can result in remote code execution on the Splunk Enterprise instance.

Learn more about our User Device Pen Test.