First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2209 | |
>=8.1.0<8.1.12 | ||
>=8.2.0<8.2.9 | ||
>=9.0.0<9.0.2 | ||
<9.0.2209 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43569.
The severity level of CVE-2022-43569 is high.
Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2 are affected by CVE-2022-43569.
CVE-2022-43569 allows an authenticated user to inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model.
Yes, you can find more information about CVE-2022-43569 at the following references: [Splunk Research](https://research.splunk.com/application/062bff76-5f9c-496e-a386-cb1adcf69871/) and [Splunk Product Security Announcements](https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html).