CVE-2023-22936Server-Side Request Forgery in Cloud Platform

Severity
6.3MEDIUMNVD
EPSS
0.2%
top 61.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateJul 6

Description

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘search_listener’ parameter in a search allows for a blind server-side request forgery (SSRF) by an authenticated user. The initiator of the request cannot see the response without the presence of an additional vulnerability within the environment.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4

Affected Packages4 packages

CVEListV5splunk/splunk_enterprise8.18.1.13+2
NVDsplunk/splunk8.1.08.1.13+2
CVEListV5splunk/splunk_cloud_platform-9.0.2209.3

🔴Vulnerability Details

2
GHSA
GHSA-786j-r97c-7r7v: In Splunk Enterprise versions below 82023-07-06
CVEList
Authenticated Blind Server Side Request Forgery via the ‘search_listener’ Search Parameter in Splunk Enterprise2023-02-14
CVE-2023-22936 — Server-Side Request Forgery in Splunk | cvebase