In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-46559 In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Splunk

Published:

Updated: 2025-05-05T20:36:39.876Z

Reserved: 2022-10-20T18:37:09.181Z

Link: CVE-2022-43563

cve-icon Vulnrichment

Updated: 2024-08-03T13:32:59.588Z

cve-icon NVD

Status : Modified

Published: 2022-11-04T23:15:09.887

Modified: 2024-11-21T07:26:47.490

Link: CVE-2022-43563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.