Lucene search

K
cvelistSplunkCVELIST:CVE-2022-32154
HistoryJun 14, 2022 - 12:00 a.m.

CVE-2022-32154 Risky commands warnings in Splunk Enterprise Dashboards

2022-06-1400:00:00
CWE-20
Splunk
www.cve.org

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will.

CNA Affected

[
  {
    "product": "Splunk Enterprise",
    "vendor": "Splunk, Inc",
    "versions": [
      {
        "lessThan": "9.0",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Splunk Cloud Platform",
    "vendor": "Splunk, Inc",
    "versions": [
      {
        "lessThan": "8.2.2106",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

Related for CVELIST:CVE-2022-32154