{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-32715","assignerOrgId":"42b59230-ec95-491e-8425-5a5befa1a469","state":"PUBLISHED","assignerShortName":"Splunk","dateReserved":"2023-05-11T20:55:59.872Z","datePublished":"2023-06-01T16:34:27.816Z","dateUpdated":"2025-02-28T11:03:57.054Z"},"containers":{"cna":{"affected":[{"product":"Splunk App for Lookup File Editing","vendor":"Splunk","versions":[{"version":"4.0","status":"affected","versionType":"custom","lessThan":"4.0.1"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will."}],"value":"In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2023-0610"}],"title":"Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing","datePublic":"2023-06-01T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1","baseScore":4.7,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.","cweId":"CWE-79"}]}],"source":{"advisory":"SVD-2023-0610"},"providerMetadata":{"orgId":"42b59230-ec95-491e-8425-5a5befa1a469","shortName":"Splunk","dateUpdated":"2025-02-28T11:03:57.054Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:25:36.489Z"},"title":"CVE Program Container","references":[{"url":"https://advisory.splunk.com/advisories/SVD-2023-0610","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-08T21:03:06.319107Z","id":"CVE-2023-32715","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-08T21:03:15.366Z"}}]}}