-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0998
            SVD-2023-0201: 'createrss' External Search Command
            Overwrites Existing RSS Feeds in Splunk Enterprise
                             17 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Splunk Enterprise
Publisher:         Splunk
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-22931  

Original Bulletin: 
   https://advisory.splunk.com//advisories/SVD-2023-0201

Comment: CVSS (Max):  4.3 CVE-2023-22931 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
         CVSS Source: Splunk
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

'createrss' External Search Command Overwrites Existing RSS Feeds in Splunk
Enterprise

Advisory ID: SVD-2023-0201

CVE ID: CVE-2023-22931

Published: 2023-02-14

Last Update: 2023-02-14

CVSSv3.1 Score: 4.3, Medium

CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CWE: CWE-285

Bug ID: SPL-216628

Description

In Splunk Enterprise versions below 8.1.13 and 8.2.10, the 'createrss' external
search command overwrites existing Resource Description Format Site Summary
(RSS) feeds without verifying permissions. This feature has been deprecated and
disabled by default.

Solution

For Splunk Enterprise, upgrade versions to 8.1.13, 8.2.10, or higher.

For Splunk Cloud Platform, Splunk is actively patching and monitoring the
Splunk Cloud instances.

Product Status

       Product        Version Component  Affected Version  Fix Version
Splunk Enterprise     8.1     Search    8.1.12 and lower   8.1.13
Splunk Enterprise     8.2     Search    8.2.0 to 8.2.9     8.2.10
Splunk Enterprise     9.0     -         Not affected       -
Splunk Cloud Platform -       Search    8.2.2202 and lower 8.2.2203

Mitigations and Workarounds

None

Detections

  o Splunk Risky Command Abuse disclosed February 2023

This hunting search includes the 'createrss' command which can be used to
identify potential misuse.

Severity

Splunk rated the vulnerability as Medium, 4.3, with a CVSSv3.1 vector of
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Acknowledgments

James Ervin, Splunk

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=R7f5
-----END PGP SIGNATURE-----