Description
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the ‘kvstore_client’ REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27044 | In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the ‘kvstore_client’ REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request. |
References
History
No history.
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:45.664Z
Reserved: 2023-01-10T21:39:55.584Z
Link: CVE-2023-22942
No data.
Status : Modified
Published: 2023-02-14T18:15:12.907
Modified: 2024-11-21T07:45:41.390
Link: CVE-2023-22942
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD