Remote Code Execution through dashboard PDF generation component in Splunk Enterprise
Advisory ID: SVD-2022-1111
CVE ID: CVE-2022-43571
Last Update: 2022-11-02
CVSSv3.1 Score: 8.8, High, High
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Bug ID: SPL-228720
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
For Splunk Enterprise, upgrade versions to 8.1.12, 8.2.9, 9.0.2, or higher.
For Splunk Cloud Platform, Splunk is actively patching and monitoring the Splunk Cloud instances.
|Product||Version||Component||Affected Version||Fix Version|
|Splunk Enterprise||8.1||8.1.11 and lower||8.1.12|
|Splunk Enterprise||8.2||8.2.0 to 8.2.8||8.2.9|
|Splunk Enterprise||9.0||9.0.0 to 9.0.1||9.0.2|
|Splunk Cloud Platform||9.0.2208 and lower||9.0.2209|
Mitigations and Workarounds
This detection search provides information about a vulnerability in Splunk Enterprise versions below 8.1.12, 8.2.9, 9.0.2209 and 9.0.2 where an authenticated user can execute arbitrary code remotely through the dashboard PDF generation component.
Splunk rates the vulnerability as High, 8.8, with a CVSS Vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability requires user access to create a dashboard.
Danylo Dmytriiev (DDV_UA)