Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing
Advisory ID: SVD-2023-0610
CVE ID: CVE-2023-32715
Published: 2023-06-01
Last Update: 2023-06-01
CVSSv3.1 Score: 4.7, Medium
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE: CWE-79
Bug ID: LOOKUP-176
Description
A user can insert potentially malicious JavaScript code into the Splunk App for Lookup File Editing, which causes the code to run on the user’s machine.
Solution
Upgrade the Splunk App for Lookup Editing to version 4.0.1 or higher.
Product Status
Product | Version | Component | Affected Version | Fix Version |
---|---|---|---|---|
Splunk App for Lookup File Editing | 4.0 | 4.0 and lower | 4.0.1 |
Mitigations and Workarounds
Disable the Splunk App for Lookup File Editing if you do not require it and cannot upgrade it. If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file in the Splunk documentation for more information on disabling Splunk Web.
Detections
None
Severity
Splunk rated this vulnerability as Medium, 4.7, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N.