CVE-2022-43571 Vulnerability Details
/
/
/
CVE-2022-43571 Metadata Quick Info
CVE Published: 03/11/2022 |
CVE Updated: 03/08/2024 |
CVE Year: 2022
Source: Splunk |
Vendor: Splunk |
Product: Splunk Enterprise
Status : PUBLISHED
CVE-2022-43571 Description
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
Metrics
CVSS Version: 3.1 |
Base Score: 8.8 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
l➤ Exploitability Metrics:
Attack Vector (AV)* NETWORK
Attack Complexity (AC)* LOW
Privileges Required (PR)* LOW
User Interaction (UI)* NONE
Scope (S)* UNCHANGED
l➤ Impact Metrics:
Confidentiality Impact (C)* HIGH
Integrity Impact (I)* HIGH
Availability Impact (A)* HIGH
Weakness Enumeration (CWE)
CWE-ID: CWE-94
CWE Name: CWE-94 Improper Control of Generation of Code (Code Injection)
Source: Splunk
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).