<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438270#M172524</link>
    <description>&lt;P&gt;As per Chris's comment most Splunk versions have this feature, there is also mention of the ability to gain root access, however that can only happen if you are running Splunk as root which is not best practice.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 22:03:40 GMT</pubDate>
    <dc:creator>gjanders</dc:creator>
    <dc:date>2019-03-12T22:03:40Z</dc:date>
    <item>
      <title>Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438267#M172521</link>
      <description>&lt;P&gt;Overview On March 4, 2019, researchers at ‘Exploit DB’ have identified a vulnerability in Splunk Enterprise and successfully created an exploit too.  This vulnerability, upon exploitation, can enable attacker to use custom apps command lines, modify and execute commands remotely. Not much details are available on this vulnerability yet. &lt;/P&gt;

&lt;P&gt;Severity: Severe&lt;BR /&gt;
Release Date: March 4, 2019 &lt;BR /&gt;
Target: Splunk Enterprise 7.2.4 on Windows Platform (Older versions might be vulnerable) &lt;BR /&gt;
Discovered By: Exploit DB researchers &lt;BR /&gt;
CVE ID: No CVE ID yet &lt;/P&gt;

&lt;P&gt;Technical detail An attacker can exploit this issue to execute arbitrary code within the context of the user running the affected application. Exploitation is possible due to improper input validation. &lt;/P&gt;

&lt;P&gt;References &lt;BR /&gt;
• &lt;A href="https://www.exploit-db.com/exploits/46487"&gt;https://www.exploit-db.com/exploits/46487&lt;/A&gt; &lt;BR /&gt;
• &lt;A href="https://packetstormsecurity.com/files/151968/splunkent724-exec.txt"&gt;https://packetstormsecurity.com/files/151968/splunkent724-exec.txt&lt;/A&gt; &lt;BR /&gt;
• &lt;A href="https://www.securityfocus.com/bid/107292/solution"&gt;https://www.securityfocus.com/bid/107292/solution&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;I came across this information and wanted to check if anyone have validated the same and fould a solution.&lt;/P&gt;

&lt;P&gt;Any kind of help will be really helpfull.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:57:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438267#M172521</guid>
      <dc:creator>umeshagarwal008</dc:creator>
      <dc:date>2019-03-12T13:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438268#M172522</link>
      <description>&lt;P&gt;"Exploits" like this turn up from time to time.  The exploit requires admin credentials to Splunk and it uses the app-upload feature. It is by design that uploading apps can run python and other executables which can do anything.&lt;/P&gt;

&lt;P&gt;As a Splunk admin you should always be careful about any app you install into your environment, becuase it will gain the ability to run with the same operating system permissions that Splunk is running as. - So never run splunk as "root" user.&lt;/P&gt;

&lt;P&gt;Here is a good blog post of recommendations for securing your Splunk instance: &lt;A href="https://www.splunk.com/blog/2016/07/10/best-practices-in-protecting-splunk-enterprise.html"&gt;https://www.splunk.com/blog/2016/07/10/best-practices-in-protecting-splunk-enterprise.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:28:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438268#M172522</guid>
      <dc:creator>chrisyounger</dc:creator>
      <dc:date>2019-03-12T14:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438269#M172523</link>
      <description>&lt;P&gt;I saw this too, and it made me laugh.&lt;BR /&gt;
This is actually a rehashed 'exploit' from a few versions back which someone has dusted off and re-released with a new version number in the report.&lt;/P&gt;

&lt;P&gt;As Chris says, this is no more an 'exploit' than me saying "CRITICAL WINDOWS VULNERABILITY : A user with admin credentials can create users" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;The warning above is however valid, admins should protect their credentials and never blindly install apps without verifying there is nothing of malice included in it.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:44:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438269#M172523</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2019-03-12T14:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise version 7.2.4 custom application remote code execution exploit using a persistent backdoor with a custom binary payload.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438270#M172524</link>
      <description>&lt;P&gt;As per Chris's comment most Splunk versions have this feature, there is also mention of the ability to gain root access, however that can only happen if you are running Splunk as root which is not best practice.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 22:03:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Enterprise-version-7-2-4-custom-application-remote-code/m-p/438270#M172524</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2019-03-12T22:03:40Z</dc:date>
    </item>
  </channel>
</rss>

