<a href="https://commons.wikimedia.org/wiki/File:Splunk_1_2019-01-07.jpg">FASTILY</a>, <a href="https://creativecommons.org/licenses/by-sa/4.0">CC BY-SA 4.0</a>, via Wikimedia Commons
A security researcher has published proof-of-concept (PoC) code for the CVE-2022-43571 flaw on his blog that will execute code on Splunk Enterprise via the dashboard PDF generation component.
Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a Web-style interface. Splunk Enterprise enables you to search, analyze and visualize your data to quickly act on insights from across your technology landscape.
Last month, Splunk announced the release of a new set of quarterly patches for Splunk Enterprise, which include fixes for nine high-severity vulnerabilities.
The most severe of these security defects have a CVSS score of 8.8 and are described as remote code execution (RCE) flaws. Tracked as CVE-2022-43571, Splunk Enterprise could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an error in the dashboard PDF generation component. Due to code injection in the SimpleXML dashboard in Splunk Enterprise, a remote attacker with low privileges can construct a specially crafted data package to perform PDF export operations, and finally achieve arbitrary code execution.
The expert’s CVE-2022-43571 PoC contains a payload that is put in the SimpleXML dashboard with sparklines. The attacker goes to Export–>Generate PDF to trigger the code injection.
This bug has been resolved with the release of Splunk Enterprise versions 8.1.12, 8.2.9, and 9.0.2. It is recommended that affected users update and upgrade to the latest version in time.