In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs. The vulnerability affects AoB and apps that AoB generates when using the REST API Modular Input functionality through its user interface. The vulnerability also potentially affects third-party apps and add-ons that call the *cloudconnectlib.splunktacollectorlib.cloud_connect_mod_input* Python class directly.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0213 | Mitigation Vendor Advisory |
https://advisory.splunk.com/advisories/SVD-2023-0213 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
References | () https://advisory.splunk.com/advisories/SVD-2023-0213 - Mitigation, Vendor Advisory |
23 Feb 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-14 18:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22943
Mitre link : CVE-2023-22943
CVE.ORG link : CVE-2023-22943
JSON object : View
Products Affected
splunk
- add-on_builder
- cloudconnect_software_development_kit