Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jjqg-fqrm-g2vj

Опубликовано: 14 фев. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs. The vulnerability affects AoB and apps that AoB generates when using the REST API Modular Input functionality through its user interface. The vulnerability also potentially affects third-party apps and add-ons that call the cloudconnectlib.splunktacollectorlib.cloud_connect_mod_input Python class directly.

In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs. The vulnerability affects AoB and apps that AoB generates when using the REST API Modular Input functionality through its user interface. The vulnerability also potentially affects third-party apps and add-ons that call the cloudconnectlib.splunktacollectorlib.cloud_connect_mod_input Python class directly.

EPSS

Процентиль: 53%
0.00297
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-295
CWE-636

Связанные уязвимости

CVSS3: 4.8
nvd
почти 3 года назад

In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs.

EPSS

Процентиль: 53%
0.00297
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-295
CWE-636