First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43562.
The severity of CVE-2022-43562 is medium (5.4).
Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2 are affected by CVE-2022-43562.
CVE-2022-43562 could allow a remote authenticated user to conduct various attacks against the system, including cross-site scripting and cache poisoning.
More information about CVE-2022-43562 can be found at the [Splunk Product Security Announcements page](https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html).