Splunk App Lookup File Editing <=4.0.1 XSS via User-Triggered JS Injection
CVE-2023-32715 Published on June 1, 2023
Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing
In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the users machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2023-32715 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2023-32715
Want to know whenever a new CVE is published for Splunk App Lookup File Editing? stack.watch will email you.
Affected Versions
Splunk App for Lookup File Editing:- Version 4.0 and below 4.0.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.