CVE-2023-46231

In Splunk Add-on Builder versions below 4.1.4, the application writes user session tokens to its internal log files when you visit the Splunk Add-on Builder or when you build or edit a custom app or add-on.
Configurations

Configuration 1 (hide)

cpe:2.3:a:splunk:add-on_builder:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:28

Type Values Removed Values Added
References () https://advisory.splunk.com/advisories/SVD-2024-0110 - Vendor Advisory () https://advisory.splunk.com/advisories/SVD-2024-0110 - Vendor Advisory
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 6.8

05 Feb 2024, 20:59

Type Values Removed Values Added
First Time Splunk
Splunk add-on Builder
References () https://advisory.splunk.com/advisories/SVD-2024-0110 - () https://advisory.splunk.com/advisories/SVD-2024-0110 - Vendor Advisory
CPE cpe:2.3:a:splunk:add-on_builder:*:*:*:*:*:*:*:*
CWE CWE-532
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

30 Jan 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 17:15

Updated : 2024-11-21 08:28


NVD link : CVE-2023-46231

Mitre link : CVE-2023-46231

CVE.ORG link : CVE-2023-46231


JSON object : View

Products Affected

splunk

  • add-on_builder
CWE
CWE-532

Insertion of Sensitive Information into Log File