CVE-2022-43570
- EPSS 0.31%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents in...
CVE-2022-43572
- EPSS 0.82%
- Veröffentlicht 04.11.2022 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.
CVE-2022-43564
- EPSS 0.4%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros.
CVE-2022-43563
- EPSS 0.2%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards ....
CVE-2022-43562
- EPSS 0.3%
- Veröffentlicht 04.11.2022 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site script...
CVE-2022-43571
- EPSS 75.21%
- Veröffentlicht 03.11.2022 23:15:21
- Zuletzt bearbeitet 21.11.2024 07:26:48
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
CVE-2022-43561
- EPSS 0.2%
- Veröffentlicht 03.11.2022 23:15:15
- Zuletzt bearbeitet 21.11.2024 07:26:47
In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web ena...
CVE-2022-37438
- EPSS 0.34%
- Veröffentlicht 16.08.2022 21:15:13
- Zuletzt bearbeitet 21.11.2024 07:14:59
In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drill...
CVE-2022-32155
- EPSS 0.43%
- Veröffentlicht 15.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:05:51
In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential sever...
CVE-2022-32154
- EPSS 0.29%
- Veröffentlicht 15.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:05:51
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capab...