CVE-2023-32715
low-risk
Published 2023-06-01
In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.
Do I need to act?
-
0.41% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (2)
Vendor Advisory
https://advisory.splunk.com/advisories/SVD-2023-0610
Vendor Advisory
https://advisory.splunk.com/advisories/SVD-2023-0610
22
/ 100
low-risk
Severity
15/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal