Vulnerability Description
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk | >= 8.1.0, < 8.1.12 |
| Splunk | Splunk Cloud Platform | < 9.0.2205 |
Related Weaknesses (CWE)
References
- https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/ExploitVendor Advisory
- https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.htmlVendor Advisory
- https://research.splunk.com/application/d532d105-c63f-4049-a8c4-e249127ca425/ExploitVendor Advisory
- https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.htmlVendor Advisory
FAQ
What is CVE-2022-43568?
CVE-2022-43568 is a vulnerability with a CVSS score of 8.8 (HIGH). In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio.
How severe is CVE-2022-43568?
CVE-2022-43568 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43568?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Splunk, Splunk Splunk Cloud Platform.