Splunk this week announced the release of a new set of quarterly patches, to address multiple vulnerabilities in Splunk Enterprise.
The most important of the bugs – based on its severity rating – is a high-severity TLS certificate validation issue in the Ingest Actions user interface.
“When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination,” Splunk explains in its advisory.
Tracked as CVE-2022-37437, the security bug only impacts connections between Splunk Enterprise and an Ingest Actions Destination that are made through Splunk Web. Only environments with TLS certificate validation configured are impacted.
According to Splunk, Destinations configured directly in the outputs.conf configuration file are not impacted. Splunk Enterprise versions before 9.0.0 are not affected. The security flaw was resolved in Splunk Enterprise version 9.0.1.
Another vulnerability Splunk addressed this week is CVE-2022-37439, a medium-severity issue that could lead to a crash when indexing a maliciously formed ZIP file using the file monitoring input. The application will crash even after a restart, requiring the manual removal of the malicious file.
The bug impacts Splunk Enterprise and Universal Forwarder releases prior to version 9.0, and it was addressed with the release of versions 8.1.11 and 8.2.7.1 of the application.
Splunk has released a tool that allows administrators to identify application crashes resulting from Zip Bomb attacks, helping them discover the malformed ZIP files that caused the crashes. However, it won’t detect the attacks before the crash.
This week, Splunk also resolved an information disclosure issue in Splunk Enterprise, that allows authenticated users to leak data through crafted dashboards. The bug was addressed with the release of Splunk Enterprise versions 8.1.11, 8.2.7.1, and 9.0.1.
Additionally, Splunk announced patches for four third-party component vulnerabilities in Splunk Enterprise and Universal Forwarders. The latest releases of both applications include fixes for one flaw in OpenSSL and three vulnerabilities in libxml2.
Further information on the addressed vulnerabilities can be found on Splunk’s product security page.
Related: Critical Code Execution Vulnerability Patched in Splunk Enterprise
Related: Cisco Patches High-Severity Vulnerability in Security Solutions
Related: SAP Patches Information Disclosure Vulnerabilities in BusinessObjects

More from Ionut Arghire
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
- Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims
- Over 200 Organizations Targeted in Chinese Cyberespionage Campaign
- Nigerian BEC Scammer Sentenced to Prison in US
Latest News
- Anti-Bot Software Firm DataDome Banks $42M Financing
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill
