Lucene search

K
cve[email protected]CVE-2022-32154
HistoryJun 15, 2022 - 5:15 p.m.

CVE-2022-32154

2022-06-1517:15:09
CWE-20
CWE-77
web.nvd.nist.gov
36
4
cve-2022-32154
splunk enterprise
security vulnerability
risky search commands
nvd
cve

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.9%

Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will.

Affected configurations

NVD
Node
splunksplunkRange<9.0enterprise
OR
splunksplunk_cloud_platformRange<8.2.2106

CNA Affected

[
  {
    "product": "Splunk Enterprise",
    "vendor": "Splunk, Inc",
    "versions": [
      {
        "lessThan": "9.0",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Splunk Cloud Platform",
    "vendor": "Splunk, Inc",
    "versions": [
      {
        "lessThan": "8.2.2106",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.9%

Related for CVE-2022-32154