First published: Tue Feb 14 2023(Updated: )
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘search_listener’ parameter in a search allows for a blind server-side request forgery (SSRF) by an authenticated user. The initiator of the request cannot see the response without the presence of an additional vulnerability within the environment.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.13 | |
Splunk Splunk | >=8.2.0<8.2.10 | |
Splunk Splunk | >=9.0.0<9.0.4 | |
Splunk Splunk Cloud Platform | <9.0.2209.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22936 is a vulnerability in Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4 that allows for a blind server-side request forgery (SSRF) by an authenticated user.
CVE-2023-22936 affects Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4.
The severity of CVE-2023-22936 is medium with a severity value of 6.3.
To fix CVE-2023-22936, update your Splunk Enterprise version to 8.1.13, 8.2.10, or 9.0.4.
You can find more information about CVE-2023-22936 on the Splunk advisory page: [https://advisory.splunk.com/advisories/SVD-2023-0206](https://advisory.splunk.com/advisories/SVD-2023-0206) and the Splunk research page: [https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd](https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd)