Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2022-AVI-548
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Splunk | Universal Forwarder | Universal Forwarder versions antérieures à 9.0 | ||
Splunk | Splunk Enterprise | Splunk Enterprise versions antérieures à 9.0 | ||
Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions antérieures à 8.2.2203 |
References
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Universal Forwarder versions ant\u00e9rieures \u00e0 9.0", "product": { "name": "Universal Forwarder", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Enterprise versions ant\u00e9rieures \u00e0 9.0", "product": { "name": "Splunk Enterprise", "vendor": { "name": "Splunk", "scada": false } } }, { "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 8.2.2203", "product": { "name": "Splunk Cloud Platform", "vendor": { "name": "Splunk", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-32152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32152" }, { "name": "CVE-2022-32151", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32151" }, { "name": "CVE-2022-32155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32155" }, { "name": "CVE-2022-32156", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32156" }, { "name": "CVE-2022-32154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32154" }, { "name": "CVE-2022-32153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32153" }, { "name": "CVE-2022-32158", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32158" }, { "name": "CVE-2022-32157", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32157" } ], "initial_release_date": "2022-06-15T00:00:00", "last_revision_date": "2022-06-15T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-548", "revisions": [ { "description": "Version initiale", "revision_date": "2022-06-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0604 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0603 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0605 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0601 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0602 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0607 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0608 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0606 du 14 juin 2022", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html" } ] }
CVE-2022-32156 (GCVE-0-2022-32156)
Vulnerability from cvelistv5
Published
2022-06-14 00:00
Modified
2024-08-03 07:32
Severity ?
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI to enable the remediation. The vulnerability does not affect the Splunk Cloud Platform. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.
The issue requires conditions beyond the control of a potential bad actor such as a machine-in-the-middle attack. Hence, Splunk rates the complexity of the attack as High.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 0 < 9.0.0 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:55.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html" }, { "tags": [ "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Universal Forwarder", "vendor": "Splunk", "versions": [ { "lessThan": "9.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eSplunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default.\u0026nbsp;\u003c/p\u003e\u003cp\u003eSplunk strongly recommends securing your Splunk environment with hardened TLS configurations. See \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/latest/Security/AboutsecuringyourSplunkconfigurationwithSSL\"\u003eSecuring the Splunk platform with TLS\u003c/a\u003e\u0026nbsp;for more information. However, the vulnerability assumes that you have configured your Splunk platform instances to use transport layer security (TLS) certificates for secure network connections. If you have not and are using the default certificates, the vulnerability is not applicable and is informational.\u003c/p\u003e" } ], "value": "Splunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default. \n\nSplunk strongly recommends securing your Splunk environment with hardened TLS configurations. See Securing the Splunk platform with TLS https://docs.splunk.com/Documentation/Splunk/latest/Security/AboutsecuringyourSplunkconfigurationwithSSL for more information. However, the vulnerability assumes that you have configured your Splunk platform instances to use transport layer security (TLS) certificates for secure network connections. If you have not and are using the default certificates, the vulnerability is not applicable and is informational.\n\n" } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI\"\u003eConfigure TLS host name validation for the Splunk CLI\u003c/a\u003e\u0026nbsp;to enable the remediation.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability does not affect the Splunk Cloud Platform. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThe issue requires conditions beyond the control of a potential bad actor such as a machine-in-the-middle attack. Hence, Splunk rates the complexity of the attack as High.\u0026nbsp;\u003c/p\u003e" } ], "value": "In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI to enable the remediation. The vulnerability does not affect the Splunk Cloud Platform. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.\n\nThe issue requires conditions beyond the control of a potential bad actor such as a machine-in-the-middle attack. Hence, Splunk rates the complexity of the attack as High. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "Universal Forwarders" } ] }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "Splunk Enterprise" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-11T18:56:14.525Z", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html" }, { "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI" } ], "source": { "advisory": "SVD-2022-0606", "discovery": "INTERNAL" }, "title": "Splunk Enterprise and Universal Forwarder CLI connections lacked TLS cert validation" } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32156", "datePublished": "2022-06-14T00:00:00", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T07:32:55.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32158 (GCVE-0-2022-32158)
Vulnerability from cvelistv5
Published
2022-06-15 16:50
Modified
2024-09-17 02:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
Splunk Enterprise deployment servers in versions before 8.1.10.1, 8.2.6.1, and 9.0 let clients deploy forwarder bundles to other deployment clients through the deployment server. An attacker that compromised a Universal Forwarder endpoint could use the vulnerability to execute arbitrary code on all other Universal Forwarder endpoints subscribed to the deployment server.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk, Inc | Splunk Enterprise |
Version: 9.0 < 9.0 Version: 8.2 < 8.2.6.1 Version: 8.1 < 8.1.10.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThan": "8.2.6.1", "status": "affected", "version": "8.2", "versionType": "custom" }, { "lessThan": "8.1.10.1", "status": "affected", "version": "8.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Nadim Taha at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Splunk Enterprise deployment servers in versions before 8.1.10.1, 8.2.6.1, and 9.0 let clients deploy forwarder bundles to other deployment clients through the deployment server. An attacker that compromised a Universal Forwarder endpoint could use the vulnerability to execute arbitrary code on all other Universal Forwarder endpoints subscribed to the deployment server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-12T20:10:32", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html" } ], "source": { "advisory": "SVD-2022-0608", "discovery": "INTERNAL" }, "title": "Splunk Enterprise deployment servers allow client publishing of forwarder bundles", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32158", "STATE": "PUBLIC", "TITLE": "Splunk Enterprise deployment servers allow client publishing of forwarder bundles" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" }, { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.6.1" }, { "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.10.1" } ] } } ] }, "vendor_name": "Splunk, Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Nadim Taha at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Splunk Enterprise deployment servers in versions before 8.1.10.1, 8.2.6.1, and 9.0 let clients deploy forwarder bundles to other deployment clients through the deployment server. An attacker that compromised a Universal Forwarder endpoint could use the vulnerability to execute arbitrary code on all other Universal Forwarder endpoints subscribed to the deployment server." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html" } ] }, "source": { "advisory": "SVD-2022-0608", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32158", "datePublished": "2022-06-15T16:50:43.633116Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-17T02:20:54.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32157 (GCVE-0-2022-32157)
Vulnerability from cvelistv5
Published
2022-06-15 16:50
Modified
2024-09-17 02:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk, Inc | Splunk Enterprise |
Version: 9.0 < 9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.013Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_process_injection_forwarder_bundle_downloads/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Nadim Taha at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:50:14", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_process_injection_forwarder_bundle_downloads/" } ], "source": { "advisory": "SVD-2022-0607", "discovery": "INTERNAL" }, "title": "Splunk Enterprise deployment servers allow unauthenticated forwarder bundle downloads", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32157", "STATE": "PUBLIC", "TITLE": "Splunk Enterprise deployment servers allow unauthenticated forwarder bundle downloads" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } } ] }, "vendor_name": "Splunk, Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Nadim Taha at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306 Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients" }, { "name": "https://research.splunk.com/application/splunk_process_injection_forwarder_bundle_downloads/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_process_injection_forwarder_bundle_downloads/" } ] }, "source": { "advisory": "SVD-2022-0607", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32157", "datePublished": "2022-06-15T16:50:14.702126Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-17T02:57:39.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32152 (GCVE-0-2022-32152)
Vulnerability from cvelistv5
Published
2022-06-15 16:46
Modified
2024-09-17 02:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk | Splunk Enterprise |
Version: 9.0 < 9.0 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk", "versions": [ { "lessThan": "8.2.2203", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:46:29", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" } ], "source": { "advisory": "SVD-2022-0602", "discovery": "INTERNAL" }, "title": "Splunk Enterprise lacked TLS cert validation for Splunk-to-Splunk communication by default", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32152", "STATE": "PUBLIC", "TITLE": "Splunk Enterprise lacked TLS cert validation for Splunk-to-Splunk communication by default" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } }, { "product_name": "Splunk Cloud Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.2203" } ] } } ] }, "vendor_name": "Splunk" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Green at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html" }, { "name": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "name": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "name": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "name": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/", "refsource": "CONFIRM", "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" } ] }, "source": { "advisory": "SVD-2022-0602", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32152", "datePublished": "2022-06-15T16:46:29.133423Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-17T02:02:11.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32155 (GCVE-0-2022-32155)
Vulnerability from cvelistv5
Published
2022-06-15 16:49
Modified
2024-09-16 20:12
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the universal forwarder now binds the management port to localhost preventing remote logins by default. If management services are not required in versions before 9.0, set disableDefaultPort = true in server.conf OR allowRemoteLogin = never in server.conf OR mgmtHostPort = localhost in web.conf. See Configure universal forwarder management security (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security) for more information on disabling the remote management services.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Splunk, Inc | Universal Forwarder |
Version: 9.0 < 9.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.013Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Universal Forwarder", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the universal forwarder now binds the management port to localhost preventing remote logins by default. If management services are not required in versions before 9.0, set disableDefaultPort = true in server.conf OR allowRemoteLogin = never in server.conf OR mgmtHostPort = localhost in web.conf. See Configure universal forwarder management security (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security) for more information on disabling the remote management services." } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:49:26", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security" } ], "source": { "advisory": "SVD-2022-0605", "discovery": "INTERNAL" }, "title": "Universal Forwarder management services allows remote login by default", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32155", "STATE": "PUBLIC", "TITLE": "Universal Forwarder management services allows remote login by default" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Universal Forwarder", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } } ] }, "vendor_name": "Splunk, Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Green at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the universal forwarder now binds the management port to localhost preventing remote logins by default. If management services are not required in versions before 9.0, set disableDefaultPort = true in server.conf OR allowRemoteLogin = never in server.conf OR mgmtHostPort = localhost in web.conf. See Configure universal forwarder management security (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security) for more information on disabling the remote management services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security" } ] }, "source": { "advisory": "SVD-2022-0605", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32155", "datePublished": "2022-06-15T16:49:26.618027Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-16T20:12:22.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32153 (GCVE-0-2022-32153)
Vulnerability from cvelistv5
Published
2022-06-15 16:48
Modified
2024-09-16 16:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-297 - Improper Validation of Certificate with Host Mismatch
Summary
Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation.
References
URL | Tags | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk, Inc | Splunk Enterprise |
Version: 9.0 < 9.0 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "8.2.2203", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-297", "description": "CWE-297 Improper Validation of Certificate with Host Mismatch", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:48:21", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html" } ], "source": { "advisory": "SVD-2022-0603", "discovery": "INTERNAL" }, "title": "Splunk Enterprise lacked TLS host name validation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32153", "STATE": "PUBLIC", "TITLE": "Splunk Enterprise lacked TLS host name validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } }, { "product_name": "Splunk Cloud Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.2203" } ] } } ] }, "vendor_name": "Splunk, Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Green at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-297 Improper Validation of Certificate with Host Mismatch" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_digital_certificates_infrastructure_version/" }, { "name": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_digital_certificates_lack_of_encryption/" }, { "name": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_selfsigned/" }, { "name": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/", "refsource": "CONFIRM", "url": "https://research.splunk.com/network/splunk_identified_ssl_tls_certificates/" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html" } ] }, "source": { "advisory": "SVD-2022-0603", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32153", "datePublished": "2022-06-15T16:48:21.566031Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-16T16:43:11.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32151 (GCVE-0-2022-32151)
Vulnerability from cvelistv5
Published
2022-06-15 16:46
Modified
2024-09-16 17:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries now verify server certificates by default and use the appropriate CA certificate stores for each library. Apps and add-ons that include their own HTTP libraries are not affected. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation.
References
URL | Tags | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk, Inc | Splunk Enterprise |
Version: 9.0 < 9.0 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_simplerequest/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "8.2.2203", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Green at Splunk" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries now verify server certificates by default and use the appropriate CA certificate stores for each library. Apps and add-ons that include their own HTTP libraries are not affected. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:46:07", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_simplerequest/" } ], "source": { "advisory": "SVD-2022-0601", "discovery": "INTERNAL" }, "title": "Splunk Enterprise disabled TLS validation using the CA certificate stores in Python 3 libraries by default", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32151", "STATE": "PUBLIC", "TITLE": "Splunk Enterprise disabled TLS validation using the CA certificate stores in Python 3 libraries by default" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } }, { "product_name": "Splunk Cloud Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.2203" } ] } } ] }, "vendor_name": "Splunk, Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Green at Splunk" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries now verify server certificates by default and use the appropriate CA certificate stores for each library. Apps and add-ons that include their own HTTP libraries are not affected. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_simplerequest/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_protocol_impersonation_weak_encryption_simplerequest/" } ] }, "source": { "advisory": "SVD-2022-0601", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32151", "datePublished": "2022-06-15T16:46:07.016591Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-16T17:59:24.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32154 (GCVE-0-2022-32154)
Vulnerability from cvelistv5
Published
2022-06-15 16:48
Modified
2024-09-16 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will.
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Splunk, Inc | Splunk Enterprise |
Version: 9.0 < 9.0 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:55.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_commands/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_spl_mltk/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_delete_usage/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Splunk Enterprise", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "9.0", "status": "affected", "version": "9.0", "versionType": "custom" } ] }, { "product": "Splunk Cloud Platform", "vendor": "Splunk, Inc", "versions": [ { "lessThan": "8.2.2106", "status": "affected", "version": "8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Green at Splunk" }, { "lang": "en", "value": "Danylo Dmytriiev (DDV_UA)" }, { "lang": "en", "value": "Anton (therceman)" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-15T16:48:46", "orgId": "42b59230-ec95-491e-8425-5a5befa1a469", "shortName": "Splunk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_commands/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_spl_mltk/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_delete_usage/" } ], "source": { "advisory": "SVD-2022-0604", "discovery": "INTERNAL" }, "title": "Risky commands warnings in Splunk Enterprise Dashboards", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "prodsec@splunk.com", "DATE_PUBLIC": "2022-06-14T11:55:00.000Z", "ID": "CVE-2022-32154", "STATE": "PUBLIC", "TITLE": "Risky commands warnings in Splunk Enterprise Dashboards" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Splunk Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0" } ] } }, { "product_name": "Splunk Cloud Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.2106" } ] } } ] }, "vendor_name": "Splunk, Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Green at Splunk" }, { "lang": "eng", "value": "Danylo Dmytriiev (DDV_UA)" }, { "lang": "eng", "value": "Anton (therceman)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates" }, { "name": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html", "refsource": "CONFIRM", "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html" }, { "name": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands", "refsource": "CONFIRM", "url": "https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands" }, { "name": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_commands/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_commands/" }, { "name": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_spl_mltk/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_spl_mltk/" }, { "name": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_delete_usage/", "refsource": "CONFIRM", "url": "https://research.splunk.com/application/splunk_command_and_scripting_interpreter_delete_usage/" } ] }, "source": { "advisory": "SVD-2022-0604", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469", "assignerShortName": "Splunk", "cveId": "CVE-2022-32154", "datePublished": "2022-06-15T16:48:46.918488Z", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-09-16T20:11:36.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…