ID |
CVE-2022-43566
|
Sažetak |
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
|
Reference |
|
CVSS |
Base: | 8.0 |
Impact: | 5.9 |
Exploitability: | 2.1 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
- |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
Zadnje važnije ažuriranje |
07-11-2023 - 03:53 |
Objavljeno |
04-11-2022 - 23:15 |