CVE-2023-22942Cross-Site Request Forgery in Enterprise

Severity
4.3MEDIUMNVD
CNA5.4
EPSS
0.1%
top 70.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 14
Latest updateJul 6

Description

In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the ‘kvstore_client’ REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

CVEListV5splunk/splunk_enterprise8.18.1.13+2
NVDsplunk/splunk8.1.08.1.13+2

🔴Vulnerability Details

2
GHSA
GHSA-4r87-mf97-8jj9: In Splunk Enterprise versions below 82023-07-06
CVEList
Cross-Site Request Forgery in the ‘ssg/kvstore_client’ REST Endpoint in Splunk Enterprise2023-02-14
CVE-2023-22942 — Cross-Site Request Forgery in Splunk | cvebase