CVE-2023-22943

In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs.
References
Link Resource
https://advisory.splunk.com/advisories/SVD-2023-0213 Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:add-on_builder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:cloudconnect_software_development_kit:*:*:*:*:*:*:*:*

History

25 Oct 2023, 18:17

Type Values Removed Values Added
Summary In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs. The vulnerability affects AoB and apps that AoB generates when using the REST API Modular Input functionality through its user interface. The vulnerability also potentially affects third-party apps and add-ons that call the *cloudconnectlib.splunktacollectorlib.cloud_connect_mod_input* Python class directly. In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs.

Information

Published : 2023-02-14 18:15

Updated : 2024-04-10 01:15


NVD link : CVE-2023-22943

Mitre link : CVE-2023-22943

CVE.ORG link : CVE-2023-22943


JSON object : View

Products Affected

splunk

  • add-on_builder
  • cloudconnect_software_development_kit
CWE
CWE-295

Improper Certificate Validation

CWE-636

Not Failing Securely ('Failing Open')