In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0608 | Vendor Advisory |
https://research.splunk.com/application/8ed58987-738d-4917-9e44-b8ef6ab948a6/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Splunk
Published: 2023-06-01T16:34:29.504Z
Updated: 2024-07-03T16:07:10.773Z
Reserved: 2023-05-11T20:55:59.872Z
Link: CVE-2023-32714
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-01T17:15:10.513
Modified: 2024-04-10T01:15:14.490
Link: CVE-2023-32714
JSON object: View
Redhat Information
No data.