Lucene search

K
cve[email protected]CVE-2022-43562
HistoryNov 04, 2022 - 11:15 p.m.

CVE-2022-43562

2022-11-0423:15:09
CWE-74
CWE-20
web.nvd.nist.gov
34
7
cve-2022-43562
nvd
splunk enterprise
security vulnerability
cross-site scripting
cache poisoning
validation
escape
authenticated user

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.6%

In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning.

Affected configurations

NVD
Node
splunksplunkRange8.1.08.1.12enterprise
OR
splunksplunkRange8.2.08.2.9enterprise
OR
splunksplunkRange9.0.09.0.2enterprise
OR
splunksplunk_cloud_platformRange<9.0.2208

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Splunk Enterprise",
    "vendor": "Splunk",
    "versions": [
      {
        "lessThan": "8.1.12",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "lessThan": "8.2.9",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      },
      {
        "lessThan": "9.0.2",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.6%

Related for CVE-2022-43562