First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk Cloud Platform | <9.0.2203 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43563.
The severity of CVE-2022-43563 is high.
Splunk Enterprise versions below 8.2.9 and 8.1.12 are affected by CVE-2022-43563.
CVE-2022-43563 allows an attacker to bypass SPL safeguards for risky commands in Splunk Enterprise.
To fix CVE-2022-43563, upgrade to Splunk Enterprise version 8.2.9 or 8.1.12.