Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-43571 PoC — Remote Code Execution through dashboard PDF generation component in Splunk Enterprise

Source
Associated Vulnerability
Title:Remote Code Execution through dashboard PDF generation component in Splunk Enterprise (CVE-2022-43571)
Description:In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.
Readme
# CVE-2022-43571

CVE-2022-43571 Splunk RCE – my personal journey to color your life
Only because I got the statement from my IT, there are no reasons for a SPLUNK update, I analyzed this vulnerability CVE-2022-43571 to prove the opposite for a remote code execution. Here is my exploit.

If I had found this vulnerability, I would like to name this „colorful sparklines“ ….. ;-)

@SPLUNK you should not name the vulnerability nor address any details in your code. It was a fast pointer into right direction ;-)
/splunk/lib/python3.7/site-packages/splunk/pdf/pdfgen_utils.py

https://psytester.github.io/CVE-2022-43571_SPLUNK_RCE/
File Snapshot

[4.0K] /data/pocs/ba014349d3976257dc94b2f732f75b18c388f6c5 └── [ 639] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →