First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2208 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43566 is a vulnerability in Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, which allows an authenticated user to run risky commands using a more privileged user’s permissions to bypass SPL safeguards.
An attacker can exploit CVE-2022-43566 by being an authenticated user and running risky commands using a more privileged user's permissions.
CVE-2022-43566 has a severity rating of high.
To fix CVE-2022-43566, upgrade to Splunk Enterprise versions 8.2.9, 8.1.12, or 9.0.2.
You can find more information about CVE-2022-43566 at the following references: https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/ and https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html