Splunk Lookup File Editing <4.0.1 Path Traversal LPE via Web Request
CVE-2023-32714 Published on June 1, 2023
Path Traversal in Splunk App for Lookup File Editing
In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.
Weakness Type
Path Traversal: '.../...//'
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Products Associated with CVE-2023-32714
stack.watch emails you whenever new vulnerabilities are published in Splunk or Splunk App Lookup File Editing. Just hit a watch button to start following.
Affected Versions
Splunk App for Lookup File Editing:- Version 4.0 and below 4.0.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.