Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-20382

Опубликовано: 03 дек. 2025
Источник: nvd
CVSS3: 3.5
CVSS3: 5.4
EPSS Низкий

Описание

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.10, 10.0.2503.8, and 9.3.2411.120, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a views dashboard with a custom background using the data:image/png;base64 protocol that could potentially lead to an unvalidated redirect. This behavior circumvents the Splunk external URL warning mechanism by using a specially crafted URL, allowing for a redirection to an external malicious site. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
Версия от 9.2.0 (включая) до 9.2.10 (исключая)
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
Версия от 9.3.0 (включая) до 9.3.8 (исключая)
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
Версия от 9.4.0 (включая) до 9.4.6 (исключая)
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
Версия от 10.0.0 (включая) до 10.0.2 (исключая)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
Версия от 9.3.2411 (включая) до 9.3.2411.120 (исключая)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
Версия от 10.0.2503 (включая) до 10.0.2503.8 (исключая)
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
Версия от 10.1.2507 (включая) до 10.1.2507.10 (исключая)

EPSS

Процентиль: 9%
0.00031
Низкий

3.5 Low

CVSS3

5.4 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 3.5
github
2 месяца назад

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.10, 10.0.2503.8, and 9.3.2411.120, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create a views dashboard with a custom background using the `data:image/png;base64` protocol that could potentially lead to an unvalidated redirect. This behavior circumvents the Splunk external URL warning mechanism by using a specially crafted URL, allowing for a redirection to an external malicious site. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.

CVSS3: 3.5
fstec
2 месяца назад

Уязвимость компонента Views Dashboard платформы для операционного анализа Splunk Enterprise, позволяющая нарушителю проводить фишинг-атаки

EPSS

Процентиль: 9%
0.00031
Низкий

3.5 Low

CVSS3

5.4 Medium

CVSS3

Дефекты

CWE-601