Total vulnerabilities in the database
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
Software | From | Fixed in |
---|---|---|
splunk / splunk | 8.2.0 | 8.2.9 |
splunk / splunk | 8.1.0 | 8.1.12 |
splunk / splunk_cloud_platform | - | 9.0.2203 |