CVE-2023-46231

In Splunk Add-on Builder versions below 4.1.4, the application writes user session tokens to its internal log files when you visit the Splunk Add-on Builder or when you build or edit a custom app or add-on.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:splunk:add-on_builder:*:*:*:*:*:*:*:*

History

05 Feb 2024, 20:59

Type Values Removed Values Added
First Time Splunk add-on Builder
Splunk
CPE cpe:2.3:a:splunk:add-on_builder:*:*:*:*:*:*:*:*
References () https://advisory.splunk.com/advisories/SVD-2024-0110 - () https://advisory.splunk.com/advisories/SVD-2024-0110 - Vendor Advisory
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 7.2
Summary
  • (es) En las versiones de Splunk Add-on Builder inferiores a 4.1.4, la aplicación escribe tokens de sesión de usuario en sus archivos de registro internos cuando visita Splunk Add-on Builder o cuando crea o edita una aplicación o complemento personalizado.

30 Jan 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 17:15

Updated : 2024-04-10 01:15


NVD link : CVE-2023-46231

Mitre link : CVE-2023-46231

CVE.ORG link : CVE-2023-46231


JSON object : View

Products Affected

splunk

  • add-on_builder
CWE
CWE-532

Insertion of Sensitive Information into Log File