Логотип exploitDog
bind:CVE-2022-26889
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-26889

Количество 2

Количество 2

nvd логотип

CVE-2022-26889

почти 4 года назад

In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing).

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-79w5-m8hm-g24m

почти 4 года назад

The lack of sanitization in a relative url path in a search parameter allows for arbitrary injection of external content in Splunk Enterprise versions before 8.1.2.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-26889

In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing).

CVSS3: 8.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-79w5-m8hm-g24m

The lack of sanitization in a relative url path in a search parameter allows for arbitrary injection of external content in Splunk Enterprise versions before 8.1.2.

CVSS3: 9.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу