Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-43563


In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.


Published

2022-11-04T23:15:09.887

Last Modified

2024-11-21T07:26:47.490

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application splunk splunk < 8.1.12 Yes
Application splunk splunk < 8.2.9 Yes
Application splunk splunk_cloud_platform < 9.0.2203 Yes

References