Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46559 | In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will. |
Mon, 05 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-05-05T20:36:39.876Z
Reserved: 2022-10-20T18:37:09.181Z
Link: CVE-2022-43563
Updated: 2024-08-03T13:32:59.588Z
Status : Modified
Published: 2022-11-04T23:15:09.887
Modified: 2024-11-21T07:26:47.490
Link: CVE-2022-43563
No data.
OpenCVE Enrichment
No data.
EUVD