Splunk Add-on Builder <4.1.4 Exposes Session Tokens via Log Files
CVE-2023-46231 Published on January 30, 2024
Session Token Disclosure to Internal Log Files in Splunk Add-on Builder
In Splunk Add-on Builder versions below 4.1.4, the application writes user session tokens to its internal log files when you visit the Splunk Add-on Builder or when you build or edit a custom app or add-on.
Weakness Type
Insertion of Sensitive Information into Log File
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
Products Associated with CVE-2023-46231
Want to know whenever a new CVE is published for Splunk Add On Builder? stack.watch will email you.
Affected Versions
Splunk Add-on Builder:- Version - and below 4.1.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.