Path Traversal in Splunk App for Lookup File Editing

Advisory ID: SVD-2023-0608

CVE ID: CVE-2023-32714

Published: 2023-06-01

Last Update: 2023-06-01

CVSSv3.1 Score: 8.1, High

CWE: CWE-35

Bug ID: LOOKUP-177

Description

A low-privileged user with access to the Splunk App for Lookup File Editing can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.

Solution

Upgrade the Splunk App for Lookup Editing to version 4.0.1 or higher.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk App for Lookup File Editing4.04.0 and lower4.0.1

Mitigations and Workarounds

N/A

Detections

This detection search provides information about path traversal exploitation attempts in Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14.

Severity

Splunk rated the vulnerability as High, 8.1, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N.

Acknowledgments

Torjus Bryne Retterstøl, Binary Security