In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data that was restricted through `srchFilter` configurations on custom roles.<br><br>The app contains an `authorize.conf` configuration file with a `srchFilter` entry that modifies the built-in ‘user’ role. Because the Splunk platform combines inherited search filters with the `OR` SPL operator, the injected filter overrides more restrictive filters on child roles.
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk AI Toolkit | 5.7 |
Updated affected versions to include 5.7.2, changed severity to HIGH, and noted that no exploit exists.
Initial creation