Vulnerability Description
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk | >= 8.1.0, < 8.1.12 |
| Splunk | Splunk Cloud Platform | < 9.0.2208 |
Related Weaknesses (CWE)
References
- https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/ExploitVendor Advisory
- https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.htmlVendor Advisory
- https://research.splunk.com/application/b6d77c6c-f011-4b03-8650-8f10edb7c4a8/ExploitVendor Advisory
- https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.htmlVendor Advisory
FAQ
What is CVE-2022-43566?
CVE-2022-43566 is a vulnerability with a CVSS score of 7.3 (HIGH). In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https...
How severe is CVE-2022-43566?
CVE-2022-43566 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43566?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Splunk, Splunk Splunk Cloud Platform.