Description
In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45151 | In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon. |
References
History
No history.
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:56.605Z
Reserved: 2023-08-16T22:07:52.838Z
Link: CVE-2023-40593
No data.
Status : Modified
Published: 2023-08-30T17:15:09.853
Modified: 2024-11-21T08:19:47.123
Link: CVE-2023-40593
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD