CVE-2022-43563
- EPSS 0.08%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards ....
CVE-2022-43564
- EPSS 0.34%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.
CVE-2022-43571
- EPSS 24.41%
- Veröffentlicht 03.11.2022 23:15:21
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
CVE-2022-43561
- EPSS 0.1%
- Veröffentlicht 03.11.2022 23:15:15
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web ena...
CVE-2022-37437
- EPSS 0.26%
- Veröffentlicht 16.08.2022 21:15:13
- Zuletzt bearbeitet 21.11.2024 07:14:59
When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections be...
CVE-2022-37438
- EPSS 0.35%
- Veröffentlicht 16.08.2022 21:15:13
- Zuletzt bearbeitet 21.11.2024 07:14:59
In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drill...
CVE-2022-37439
- EPSS 0.12%
- Veröffentlicht 16.08.2022 21:15:13
- Zuletzt bearbeitet 21.11.2024 07:14:59
In Splunk Enterprise and Universal Forwarder versions in the following table, indexing a specially crafted ZIP file using the file monitoring input can result in a crash of the application. Attempts to restart the application would result in a crash ...
CVE-2022-32154
- EPSS 0.29%
- Veröffentlicht 15.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:05:51
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capab...
CVE-2022-32155
- EPSS 0.43%
- Veröffentlicht 15.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:05:51
In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential sever...
CVE-2022-32156
- EPSS 0.19%
- Veröffentlicht 15.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:05:51
In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configur...