Lucene search

K
nvd[email protected]NVD:CVE-2022-43566
HistoryNov 04, 2022 - 11:15 p.m.

CVE-2022-43566

2022-11-0423:15:10
CWE-20
web.nvd.nist.gov
6
splunk enterprise
spl safeguards
risky commands
phishing attack

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

42.8%

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards  in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.

Affected configurations

NVD
Node
splunksplunkRange8.1.08.1.12enterprise
OR
splunksplunkRange8.2.08.2.9enterprise
OR
splunksplunkRange9.0.09.0.2enterprise
OR
splunksplunk_cloud_platformRange<9.0.2208

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

42.8%

Related for NVD:CVE-2022-43566