
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-22931 affects Splunk Enterprise versions below 8.1.13 and 8.2.10, where the 'createrss' external search command has a vulnerability that allows overwriting existing Resource Description Format Site Summary (RSS) feeds without proper permission verification. The vulnerability was discovered and disclosed on February 14, 2023. The affected systems include Splunk Enterprise versions 8.1.0-8.1.12, 8.2.0-8.2.9, and Splunk Cloud Platform versions up to 8.2.2202 (Splunk Advisory).
The vulnerability has been assigned a CVSSv3.1 base score of 4.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. The issue is related to improper authorization (CWE-285) and incorrect default permissions (CWE-276). The vulnerability specifically involves the 'createrss' external search command, which has been deprecated and disabled by default due to its security implications (Splunk Advisory).
The vulnerability allows attackers to overwrite existing RSS feeds without proper permission verification, potentially leading to unauthorized modification of RSS feed content. The impact is primarily limited to integrity concerns, as indicated by the CVSS metrics showing impact only on integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact (Splunk Advisory).
For Splunk Enterprise users, the recommended solution is to upgrade to versions 8.1.13, 8.2.10, or higher. For Splunk Cloud Platform users, Splunk has actively patched and monitored the affected Cloud instances, with the fix version being 8.2.2203. No alternative mitigations or workarounds are provided (Splunk Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."