Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2022-1950
Vulnerability from csaf_certbund
Published
2022-11-02 23:00
Modified
2022-12-27 23:00
Summary
Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Splunk Enterprise ausnutzen, um Code zur Ausführung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Splunk Enterprise ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1950 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1950.json" }, { "category": "self", "summary": "WID-SEC-2022-1950 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1950" }, { "category": "external", "summary": "psytester Blog vom 2022-12-27", "url": "https://psytester.github.io/CVE-2022-43571_SPLUNK_RCE/" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1112.html" }, { "category": "external", "summary": "Splunk Security Advisory vom 2022-11-02", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1113.html" } ], "source_lang": "en-US", "title": "Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2022-12-27T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:37:30.387+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1950", "initial_release_date": "2022-11-02T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-02T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "Schreibfehler korrigiert" }, { "date": "2022-12-27T23:00:00.000+00:00", "number": "3", "summary": "PoC f\u00fcr CVE-2022-43571 aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 8.1.12", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.12", "product_id": "T025214", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.12" } } }, { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 8.2.9", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.9", "product_id": "T025215", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.9" } } }, { "category": "product_name", "name": "Splunk Splunk Enterprise \u003c 9.0.2", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.2", "product_id": "T025216", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.2" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2022-43561", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43561" }, { "cve": "CVE-2022-43562", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43562" }, { "cve": "CVE-2022-43563", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43563" }, { "cve": "CVE-2022-43564", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43564" }, { "cve": "CVE-2022-43565", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43565" }, { "cve": "CVE-2022-43566", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43566" }, { "cve": "CVE-2022-43567", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43567" }, { "cve": "CVE-2022-43568", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43568" }, { "cve": "CVE-2022-43569", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43569" }, { "cve": "CVE-2022-43570", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43570" }, { "cve": "CVE-2022-43571", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43571" }, { "cve": "CVE-2022-43572", "notes": [ { "category": "description", "text": "In Splunk Enterprise existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Code zur Ausf\u00fchrung zu bringen, Sicherheitsvorkehrungen zu umgehen, Informationen offenzulegen, Daten zu manipulieren oder einen Denial of Service zu verursachen. Zur Ausnutzung einiger Schwachstellen ist eine Interaktion des Opfers notwendig." } ], "release_date": "2022-11-02T23:00:00.000+00:00", "title": "CVE-2022-43572" } ] }
CVE-2022-43563 (GCVE-0-2022-43563)
Vulnerability from cvelistv5
Published
2022-11-04 22:19
Modified
2025-05-05 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43563", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T20:36:26.391813Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T20:36:39.876Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards\"\u003eSPL safeguards for risky commands\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:19:55.669Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html" } ], "source": { "advisory": "SVD-2022-1103", "discovery": "INTERNAL" }, "title": "Risky command safeguards bypass via rex search command field names in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43563", "datePublished": "2022-11-04T22:19:55.669Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2025-05-05T20:36:39.876Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43561 (GCVE-0-2022-43561)
Vulnerability from cvelistv5
Published
2022-11-03 22:06
Modified
2025-04-25 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation
Summary
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/a974d1ee-ddca-4837-b6ad-d55a8a239c20/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43561", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-25T19:08:21.266760Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-25T19:10:23.182Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mr Hack (try_to_hack)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the \u201cpower\u201d Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled." } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the \u201cpower\u201d Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T22:06:41.735Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html" }, { "url": "https://research.splunk.com/application/a974d1ee-ddca-4837-b6ad-d55a8a239c20/" } ], "source": { "advisory": "SVD-2022-1101", "discovery": "EXTERNAL" }, "title": "Persistent Cross-Site Scripting in \u201cSave Table\u201d Dialog in Splunk Enterprise", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIf users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/8.2.5/Security/DisableunnecessarySplunkcomponents\"\u003eSee Disable unnecessary Splunk Enterprise components\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;and the \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/latest/Admin/Webconf\"\u003eweb.conf\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;configuration specification file for more information on disabling Splunk Web.\u003c/span\u003e\u003cbr\u003e" } ], "value": "If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. See Disable unnecessary Splunk Enterprise components https://docs.splunk.com/Documentation/Splunk/8.2.5/Security/DisableunnecessarySplunkcomponents and the web.conf https://docs.splunk.com/Documentation/Splunk/latest/Admin/Webconf configuration specification file for more information on disabling Splunk Web.\n" } ] } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43561", "datePublished": "2022-11-03T22:06:41.735Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2025-04-25T19:10:23.182Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43569 (GCVE-0-2022-43569)
Vulnerability from cvelistv5
Published
2022-11-04 22:22
Modified
2025-04-30 20:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)
Summary
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/062bff76-5f9c-496e-a386-cb1adcf69871/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43569", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T20:01:53.381004Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-30T20:02:18.090Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:22:31.895Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html" }, { "url": "https://research.splunk.com/application/062bff76-5f9c-496e-a386-cb1adcf69871/" } ], "source": { "advisory": "SVD-2022-1109", "discovery": "EXTERNAL" }, "title": "Persistent Cross-Site Scripting via a Data Model object name in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43569", "datePublished": "2022-11-04T22:22:31.895Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2025-04-30T20:02:18.090Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43566 (GCVE-0-2022-43566)
Vulnerability from cvelistv5
Published
2022-11-04 22:21
Modified
2025-05-05 20:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43566", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T20:34:42.699126Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T20:34:58.924Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Anton (therceman)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user\u2019s permissions to bypass \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards\"\u003eSPL safeguards for risky commands\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user\u2019s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards \u00a0in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:21:21.337Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html" }, { "url": "https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/" } ], "source": { "advisory": "SVD-2022-1106", "discovery": "EXTERNAL" }, "title": "Risky command safeguards bypass via Search ID query in Analytics Workspace in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43566", "datePublished": "2022-11-04T22:21:21.337Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2025-05-05T20:34:58.924Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43571 (GCVE-0-2022-43571)
Vulnerability from cvelistv5
Published
2022-11-03 22:56
Modified
2025-05-02 18:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code (Code Injection)
Summary
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/b06b41d7-9570-4985-8137-0784f582a1b3/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43571", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-02T18:24:19.490886Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-02T18:24:40.047Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-03T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.\u003c/p\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (Code Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T22:56:44.862Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" }, { "url": "https://research.splunk.com/application/b06b41d7-9570-4985-8137-0784f582a1b3/" } ], "source": { "advisory": "SVD-2022-1111", "discovery": "EXTERNAL" }, "title": "Remote Code Execution through dashboard PDF generation component in Splunk Enterprise", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43571", "datePublished": "2022-11-03T22:56:44.862Z", "dateReserved": "2022-10-20T18:37:09.183Z", "dateUpdated": "2025-05-02T18:24:40.047Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43565 (GCVE-0-2022-43565)
Vulnerability from cvelistv5
Published
2022-11-04 22:20
Modified
2025-05-05 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the ‘tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43565", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T20:35:26.516477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T20:35:48.097Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the \u2018tstats command handles Javascript Object Notation (JSON) lets an attacker bypass \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards\"\u003eSPL safeguards for risky commands\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. \u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the \u2018tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. \n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:20:55.783Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html" } ], "source": { "advisory": "SVD-2022-1105", "discovery": "INTERNAL" }, "title": "Risky command safeguards bypass via \u2018tstats command JSON in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43565", "datePublished": "2022-11-04T22:20:55.783Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2025-05-05T20:35:48.097Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43568 (GCVE-0-2022-43568)
Vulnerability from cvelistv5
Published
2022-11-04 22:22
Modified
2025-05-01 19:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)
Summary
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43568", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T19:39:03.727353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T19:39:17.951Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:22:13.266Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html" }, { "url": "https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/" } ], "source": { "advisory": "SVD-2022-1108", "discovery": "EXTERNAL" }, "title": "Reflected Cross-Site Scripting via the radio template in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43568", "datePublished": "2022-11-04T22:22:13.266Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2025-05-01T19:39:17.951Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36518 (GCVE-0-2020-36518)
Vulnerability from cvelistv5
Published
2022-03-11 00:00
Modified
2025-05-01 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2816" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "[debian-lts-announce] 20220502 [SECURITY] [DLA 2990-1] jackson-databind security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220506-0004/" }, { "name": "DSA-5283", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5283" }, { "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3207-1] jackson-databind security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-36518", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T03:55:10.091Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-27T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/FasterXML/jackson-databind/issues/2816" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "[debian-lts-announce] 20220502 [SECURITY] [DLA 2990-1] jackson-databind security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html" }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20220506-0004/" }, { "name": "DSA-5283", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5283" }, { "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3207-1] jackson-databind security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-36518", "datePublished": "2022-03-11T00:00:00.000Z", "dateReserved": "2022-03-11T00:00:00.000Z", "dateUpdated": "2025-05-01T03:55:10.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43572 (GCVE-0-2022-43572)
Vulnerability from cvelistv5
Published
2022-11-04 22:23
Modified
2025-05-01 19:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43572", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T19:56:51.753772Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T19:57:01.357Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:23:39.383Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html" } ], "source": { "advisory": "SVD-2022-1112", "discovery": "UNKNOWN" }, "title": "Indexing blockage via malformed data sent through S2S or HEC protocols in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43572", "datePublished": "2022-11-04T22:23:39.383Z", "dateReserved": "2022-10-20T18:41:33.321Z", "dateUpdated": "2025-05-01T19:57:01.357Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43567 (GCVE-0-2022-43567)
Vulnerability from cvelistv5
Published
2022-11-04 22:21
Modified
2025-05-05 20:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Summary
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html" }, { "tags": [ "x_transferred" ], "url": "https://research.splunk.com/application/baa41f09-df48-4375-8991-520beea161be/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43567", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T20:33:23.307535Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T20:34:05.121Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:21:50.819Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html" }, { "url": "https://research.splunk.com/application/baa41f09-df48-4375-8991-520beea161be/" } ], "source": { "advisory": "SVD-2022-1107", "discovery": "EXTERNAL" }, "title": "Remote Code Execution via the Splunk Secure Gateway application Mobile Alerts feature" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43567", "datePublished": "2022-11-04T22:21:50.819Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2025-05-05T20:34:05.121Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43570 (GCVE-0-2022-43570)
Vulnerability from cvelistv5
Published
2022-11-04 22:22
Modified
2025-05-05 20:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43570", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T20:29:44.023756Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T20:30:12.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Danylo Dmytriiev (DDV_UA)" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:22:50.526Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html" } ], "source": { "advisory": "SVD-2022-1110", "discovery": "EXTERNAL" }, "title": "XML External Entity Injection through a custom View in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43570", "datePublished": "2022-11-04T22:22:50.526Z", "dateReserved": "2022-10-20T18:37:09.182Z", "dateUpdated": "2025-05-05T20:30:12.036Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43564 (GCVE-0-2022-43564)
Vulnerability from cvelistv5
Published
2022-11-04 22:20
Modified
2025-05-01 20:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43564", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-01T20:22:25.118984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-01T20:22:37.435Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:20:36.543Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html" } ], "source": { "advisory": "SVD-2022-1104", "discovery": "INTERNAL" }, "title": "Denial of Service in Splunk Enterprise through search macros" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43564", "datePublished": "2022-11-04T22:20:36.543Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2025-05-01T20:22:37.435Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43562 (GCVE-0-2022-43562)
Vulnerability from cvelistv5
Published
2022-11-04 22:19
Modified
2025-05-05 20:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 8.1 < 8.1.12 Version: 8.2 < 8.2.9 Version: 9.0 < 9.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.735Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43562", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-05T20:37:08.317844Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-05T20:37:25.294Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "8.1.12", "status": "affected", "version": "8.1", "versionType": "custom" }, { "lessThan": "8.2.9", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "9.0.2", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ali Mirheidari at Splunk" } ], "datePublic": "2022-11-02T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.\u003c/span\u003e\u003cbr\u003e" } ], "value": "In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-04T22:19:11.815Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html" } ], "source": { "advisory": "SVD-2022-1102", "discovery": "INTERNAL" }, "title": "Host Header Injection in Splunk Enterprise" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-43562", "datePublished": "2022-11-04T22:19:11.815Z", "dateReserved": "2022-10-20T18:37:09.181Z", "dateUpdated": "2025-05-05T20:37:25.294Z", "requesterUserId": "d03a2723-f9e2-46d2-8173-16ee7d33f715", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…