Splunk Inc Splunk Cloud Platform vulnerabilities
3 known vulnerabilities affecting splunk_inc/splunk_cloud_platform.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2
Vulnerabilities
Page 1 of 1
CVE-2022-32151CRITICALCVSS 9.1≥ 8.2, < 8.2.22032022-06-15
CVE-2022-32151 [CRITICAL] CWE-295 CVE-2022-32151: The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate
The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries now verify server certificates by default and use t
cvelistv5nvd
CVE-2022-32154HIGHCVSS 8.1≥ 8.2, < 8.2.21062022-06-15
CVE-2022-32154 [HIGH] CWE-20 CVE-2022-32154: Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search comman
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Document
cvelistv5nvd
CVE-2022-32153HIGHCVSS 8.1≥ 8.2, < 8.2.22032022-06-15
CVE-2022-32153 [HIGH] CWE-297 CVE-2022-32153: Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions
Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could
cvelistv5nvd