In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the "admin" Splunk roles.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2025-0101 |
Configurations
No configuration.
History
15 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the "admin" Splunk roles. |
07 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-07 17:15
Updated : 2025-01-15 17:15
NVD link : CVE-2025-22621
Mitre link : CVE-2025-22621
CVE.ORG link : CVE-2025-22621
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management