// For flags

CVE-2022-37438

Information disclosure via the dashboard drilldown in Splunk Enterprise

Severity Score

3.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Splunk Enterprise versions in the following table, an authenticated user can craft a dashboard that could potentially leak information (for example, username, email, and real name) about Splunk users, when visited by another user through the drilldown component. The vulnerability requires user access to create and share dashboards using Splunk Web.

En las versiones de Splunk Enterprise de la siguiente tabla, un usuario autenticado puede diseñar un panel de control que podría filtrar información (por ejemplo, nombre de usuario, correo electrónico y nombre real) sobre los usuarios de Splunk, cuando es visitado por otro usuario por medio del componente drilldown. La vulnerabilidad requiere el acceso del usuario para crear y compartir cuadros de mando usando Splunk Web.

*Credits: Eric LaMothe at Splunk
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-05 CVE Reserved
  • 2022-08-16 CVE Published
  • 2024-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
>= 8.1.0 < 8.1.11
Search vendor "Splunk" for product "Splunk" and version " >= 8.1.0 < 8.1.11"
enterprise
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
>= 8.2.0 < 8.2.7.1
Search vendor "Splunk" for product "Splunk" and version " >= 8.2.0 < 8.2.7.1"
enterprise
Affected
Splunk
Search vendor "Splunk"
Splunk
Search vendor "Splunk" for product "Splunk"
9.0.0
Search vendor "Splunk" for product "Splunk" and version "9.0.0"
enterprise
Affected
Splunk
Search vendor "Splunk"
Splunk Cloud Platform
Search vendor "Splunk" for product "Splunk Cloud Platform"
<= 8.2.2203.4
Search vendor "Splunk" for product "Splunk Cloud Platform" and version " <= 8.2.2203.4"
-
Affected