First published: Thu Jun 01 2023(Updated: )
In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.14 | |
Splunk Splunk | >=8.2.0<8.2.11 | |
Splunk Splunk | >=9.0.0<9.0.5 | |
Splunk Splunk App For Lookup File Editing | <4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32714 is a path traversal vulnerability in the Splunk App for Lookup File Editing.
CVE-2023-32714 has a severity rating of 8.1, which is considered high.
Splunk App for Lookup File Editing versions below 4.0.1 are affected by CVE-2023-32714.
A low-privileged user can exploit CVE-2023-32714 by sending a specially crafted web request that triggers a path traversal exploit.
An attacker can use CVE-2023-32714 to read and write to restricted areas of the Splunk installation directory.