In the Splunk App for Lookup File Editing versions below 4.0.1, a low-privileged user can, with a specially crafted web request, trigger a path traversal exploit that can then be used to read and write to restricted areas of the Splunk installation directory.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-01-15T17:05:34.904Z
Reserved: 2023-05-11T20:55:59.872Z
Link: CVE-2023-32714

No data.

Status : Modified
Published: 2023-06-01T17:15:10.513
Modified: 2024-11-21T08:03:54.183
Link: CVE-2023-32714

No data.