CVE Vulnerabilities

CVE-2022-43563

Published: Nov 04, 2022 | Modified: Nov 07, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.

Affected Software

Name Vendor Start Version End Version
Splunk Splunk 8.1.0 (including) 8.1.12 (excluding)
Splunk Splunk 8.2.0 (including) 8.2.9 (excluding)
Splunk_cloud_platform Splunk * 9.0.2203 (excluding)

References