Lucene search

K
cveSplunkCVE-2023-32715
HistoryJun 01, 2023 - 5:15 p.m.

CVE-2023-32715

2023-06-0117:15:10
CWE-79
Splunk
web.nvd.nist.gov
117
splunk
lookup file editing
javascript
injection
user interaction
nvd
cve-2023-32715

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

18.5%

In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.

Affected configurations

Nvd
Node
splunksplunk_app_for_lookup_file_editingRange<4.0.1
VendorProductVersionCPE
splunksplunk_app_for_lookup_file_editing*cpe:2.3:a:splunk:splunk_app_for_lookup_file_editing:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Splunk App for Lookup File Editing",
    "vendor": "Splunk",
    "versions": [
      {
        "version": "4.0",
        "status": "affected",
        "versionType": "custom",
        "lessThan": "4.0.1"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

18.5%

Related for CVE-2023-32715