First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the ‘tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk Cloud Platform | <9.0.2203 | |
>=8.1.0<8.1.12 | ||
>=8.2.0<8.2.9 | ||
<9.0.2203 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Splunk Enterprise vulnerability is CVE-2022-43565.
The severity of CVE-2022-43565 is high.
Splunk Enterprise versions below 8.2.9 and 8.1.12 are affected by CVE-2022-43565.
CVE-2022-43565 allows an attacker to bypass SPL safeguards by exploiting the way the 'tstats' command handles JSON.
You can find more information about CVE-2022-43565 at https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html.