CVE Published: 01/06/2023 |
CVE Updated: 30/10/2024 |
CVE Year: 2023 Source: Splunk |
Vendor: Splunk |
Product: Splunk App for Lookup File Editing Status : PUBLISHED
CVE-2023-32714 Description
In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.
Metrics
CVSS Version: 3.1 |
Base Score: 8.1 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CWE-ID: CWE-35 CWE Name: The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize
.../...//
(doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. Source: Splunk
Common Attack Pattern Enumeration and Classification (CAPEC)