First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2205 | |
>=8.1.0<8.1.12 | ||
>=8.2.0<8.2.9 | ||
>=9.0.0<9.0.2 | ||
<9.0.2205 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43568.
The severity of CVE-2022-43568 is high with a severity value of 6.1.
Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2 are affected by CVE-2022-43568.
CVE-2022-43568 can be exploited through a View that allows for a Reflected Cross Site Scripting via JSON in a query parameter.
Yes, you can find more information about CVE-2022-43568 at the following references: [Link 1](https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/) and [Link 2](https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html).