First published: Thu Nov 03 2022(Updated: )
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2209 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43571 is a vulnerability in Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, where an authenticated user can execute arbitrary code through the dashboard PDF generation component.
CVE-2022-43571 has a severity rating of 8.8 (high).
CVE-2022-43571 affects Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, as well as Splunk Cloud Platform up to version 9.0.2209.
An authenticated user can exploit CVE-2022-43571 by executing arbitrary code through the dashboard PDF generation component in affected versions of Splunk Enterprise.
Yes, for CVE-2022-43571, it is recommended to upgrade Splunk Enterprise to version 8.2.9, 8.1.12, or 9.0.2, and upgrade Splunk Cloud Platform to a version higher than 9.0.2209.