Vulnerabilities > Splunk

DATE CVE VULNERABILITY TITLE RISK
2023-02-14 CVE-2023-22937 Unrestricted Upload of File with Dangerous Type vulnerability in Splunk and Splunk Cloud Platform
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions.
network
low complexity
splunk CWE-434
4.3
2023-02-14 CVE-2023-22938 Unspecified vulnerability in Splunk and Splunk Cloud Platform
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘sendemail’ REST API endpoint lets any authenticated user send an email as the Splunk instance.
network
low complexity
splunk
4.3
2023-02-14 CVE-2023-22939 Unspecified vulnerability in Splunk and Splunk Cloud Platform
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands.
network
low complexity
splunk
8.8
2023-02-14 CVE-2023-22940 Unspecified vulnerability in Splunk and Splunk Cloud Platform
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the ‘collect’ search processing language (SPL) command, including ‘summaryindex’, ‘sumindex’, ‘stash’,’ mcollect’, and ‘meventcollect’, were not designated as safeguarded commands.
network
low complexity
splunk
5.7
2023-02-14 CVE-2023-22941 Unspecified vulnerability in Splunk and Splunk Cloud Platform
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted ‘INGEST_EVAL’ parameter in a Field Transformation crashes the Splunk daemon (splunkd).
network
low complexity
splunk
7.5
2023-02-14 CVE-2023-22942 Cross-Site Request Forgery (CSRF) vulnerability in Splunk
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the ‘kvstore_client’ REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request.
network
low complexity
splunk CWE-352
4.3
2023-02-14 CVE-2023-22943 Improper Certificate Validation vulnerability in Splunk products
In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs.
network
low complexity
splunk CWE-295
5.3
2023-02-09 CVE-2022-43552 Use After Free vulnerability in multiple products
A use after free vulnerability exists in curl <7.87.0.
network
high complexity
haxx apple splunk CWE-416
5.9
2022-12-23 CVE-2022-43551 Cleartext Transmission of Sensitive Information vulnerability in multiple products
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP.
network
low complexity
haxx fedoraproject netapp splunk CWE-319
7.5
2022-12-05 CVE-2022-32221 Exposure of Resource to Wrong Sphere vulnerability in multiple products
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback.
network
low complexity
haxx netapp debian apple splunk CWE-668
critical
9.8