First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2209 | |
>=8.1.0<8.1.12 | ||
>=8.2.0<8.2.9 | ||
>=9.0.0<9.0.2 | ||
<9.0.2209 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43570 is a vulnerability in Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2 that allows an authenticated user to perform an XML external entity (XXE) injection via a custom View.
An authenticated user can exploit CVE-2022-43570 by injecting malicious XML external entities (XXE) through a custom View in Splunk Web.
The XXE injection in CVE-2022-43570 can cause Splunk Web to embed incorrect documents into an error, potentially leading to information disclosure or other attacks.
Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2 are affected by CVE-2022-43570.
More information about CVE-2022-43570 can be found at the following reference link: [link](https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html)