First published: Tue Jan 30 2024(Updated: )
In Splunk Add-on Builder versions below 4.1.4, the application writes user session tokens to its internal log files when you visit the Splunk Add-on Builder or when you build or edit a custom app or add-on.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Add-on Builder | <4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46231 has been classified with a high severity due to the exposure of sensitive user session tokens.
To fix CVE-2023-46231, update the Splunk Add-on Builder to version 4.1.4 or later.
CVE-2023-46231 affects Splunk Add-on Builder versions below 4.1.4.
CVE-2023-46231 compromises user session tokens by writing them to internal log files.
To prevent CVE-2023-46231, ensure your Splunk Add-on Builder is updated to the latest version.