CVE-2022-43563Improper Input Validation in Enterprise

Severity
8.8HIGHNVD
CNA8.1
EPSS
0.2%
top 57.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateNov 5

Description

In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5splunk/splunk_enterprise8.18.1.12+1
NVDsplunk/splunk8.1.08.1.12+1

🔴Vulnerability Details

2
GHSA
GHSA-x733-8f5f-m9rp: In Splunk Enterprise versions below 82022-11-05
CVEList
Risky command safeguards bypass via rex search command field names in Splunk Enterprise2022-11-04
CVE-2022-43563 — Improper Input Validation in Splunk | cvebase