CVE-2023-22943
CVSS V2 None
CVSS V3 None
Description
In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs. The vulnerability affects AoB and apps that AoB generates when using the REST API Modular Input functionality through its user interface. The vulnerability also potentially affects third-party apps and add-ons that call the *cloudconnectlib.splunktacollectorlib.cloud_connect_mod_input* Python class directly.
Overview
- CVE ID
- CVE-2023-22943
- Assigner
- prodsec@splunk.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-14T18:15:12
- Last Modified Date
- 2023-02-23T16:17:58
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:splunk:add-on_builder:*:*:*:*:*:*:*:* | 1 | OR | 4.1.0 | 4.1.2 |
cpe:2.3:a:splunk:cloudconnect_software_development_kit:*:*:*:*:*:*:*:* | 1 | OR | 3.1.0 | 3.1.3 |
References
Reference URL | Reference Tags |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0213 | Mitigation Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-22943 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22943 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:43:28 | Added to TrackCVE | |||
2023-04-17 07:43:30 | Weakness Enumeration | new |