Splunk Add-on Builder <4.1.4 Exposes Session Tokens via Log Files
CVE-2023-46231 Published on January 30, 2024

Session Token Disclosure to Internal Log Files in Splunk Add-on Builder
In Splunk Add-on Builder versions below 4.1.4, the application writes user session tokens to its internal log files when you visit the Splunk Add-on Builder or when you build or edit a custom app or add-on.

NVD

Weakness Type

Insertion of Sensitive Information into Log File

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.


Products Associated with CVE-2023-46231

Want to know whenever a new CVE is published for Splunk Add On Builder? stack.watch will email you.

 

Affected Versions

Splunk Add-on Builder:

Exploit Probability

EPSS
0.19%
Percentile
40.68%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.