CVE-2023-22942

CVSS V2 None CVSS V3 None
Description
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the ‘kvstore_client’ REST endpoint lets a potential attacker update SSG [App Key Value Store (KV store)](https://docs.splunk.com/Documentation/Splunk/latest/Admin/AboutKVstore) collections using an HTTP GET request. SSG is a Splunk-built app that comes with Splunk Enterprise. The vulnerability affects instances with SSG and Splunk Web enabled.
Overview
  • CVE ID
  • CVE-2023-22942
  • Assigner
  • prodsec@splunk.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-02-14T18:15:12
  • Last Modified Date
  • 2023-02-23T16:08:20
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* 1 OR 8.1.0 8.1.13
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* 1 OR 8.2.0 8.2.10
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* 1 OR 9.0.0 9.0.4
History
Created Old Value New Value Data Type Notes
2023-04-17 07:43:13 Added to TrackCVE
2023-04-17 07:43:15 Weakness Enumeration new