<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk 5.0 Vulnerability in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74896#M181263</link>
    <description>&lt;P&gt;I agree w/ Drainy here.  The ability to run scripts from Splunk is a feature - those scripts will run under whatever operating system authority you start Splunk as.  The ability to upload apps (which can contain scripts) is also a feature, and is only available to users who have authenticated to Splunk and have the proper access within Splunk.  &lt;/P&gt;

&lt;P&gt;If your Splunk environment is properly configured and hardened, then your exposure to this vulnerability is limited to "how well can I trust my users with Splunk admin rights?"&lt;/P&gt;

&lt;P&gt;In a potentially hostile environment, many good practices apply, including:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Change the 'admin' password, and/or delete the 'admin' account&lt;/LI&gt;
&lt;LI&gt;Minimize the set of users with admin-equivalent access&lt;/LI&gt;
&lt;LI&gt;Don't run Splunkd or Splunkweb as root&lt;/LI&gt;
&lt;LI&gt;Firewall the Splunkd / Splunkweb TCP ports as appropriate&lt;/LI&gt;
&lt;LI&gt;Establish and enforce a change management policy for app installs / updates&lt;/LI&gt;
&lt;LI&gt;Use Splunk itself to search/alert upon logged events around app changes&lt;/LI&gt;
&lt;LI&gt;Use a file change monitor to look for changes to the scripts within permitted Splunk apps&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;If this cannot provide you with sufficient risk mitigation, it &lt;STRONG&gt;may&lt;/STRONG&gt; be possible to completely disable scripted inputs and other script-calling features within Splunk.  You would do so, however, at a great functionality cost.  If this is the route you wish to take, I would recommend opening a support case and documenting your concerns and asking for help with configuring Splunk to remove as much script-calling functionality as possible.  (Again, you will probably not be happy with this decision functionality-wise)&lt;/P&gt;</description>
    <pubDate>Mon, 31 Dec 2012 21:18:56 GMT</pubDate>
    <dc:creator>dwaddle</dc:creator>
    <dc:date>2012-12-31T21:18:56Z</dc:date>
    <item>
      <title>Splunk 5.0 Vulnerability</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74894#M181261</link>
      <description>&lt;P&gt;I've encountered with this finding at Packetstorm website. May I know whether Splunk already verified and acknowledge on the finding as we plan to upgrade our Splunk to that latest version. &lt;/P&gt;

&lt;P&gt;&lt;A href="http://packetstormsecurity.com/files/118697/Splunk-5.0-Custom-App-Remote-Code-Execution.html"&gt;http://packetstormsecurity.com/files/118697/Splunk-5.0-Custom-App-Remote-Code-Execution.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2012 08:46:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74894#M181261</guid>
      <dc:creator>yap</dc:creator>
      <dc:date>2012-12-31T08:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.0 Vulnerability</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74895#M181262</link>
      <description>&lt;P&gt;Well, this one has been floating around a while and I don't personally consider it a vulnerability.&lt;/P&gt;

&lt;P&gt;Basically, it depends on you installing Splunk, not changing the default password (which it asks you to do on the first login), running it as root - which is not "default" as the vuln page says. Its generally something silly people do to make reading /var/log easier. &lt;/P&gt;

&lt;P&gt;Run it as the "splunk" user that the install package creates, change the admin password, create your own account and delete the admin user - nothing to worry about.&lt;/P&gt;

&lt;P&gt;If you were to call this a vuln then it technically affects 4.2 and 4.3 as they all have the same script execution behaviour &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;EDIT: FYI, The Splunk Security portal can be found here;  &lt;A href="http://www.splunk.com/page/securityportal"&gt;http://www.splunk.com/page/securityportal&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2012 08:54:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74895#M181262</guid>
      <dc:creator>Drainy</dc:creator>
      <dc:date>2012-12-31T08:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.0 Vulnerability</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74896#M181263</link>
      <description>&lt;P&gt;I agree w/ Drainy here.  The ability to run scripts from Splunk is a feature - those scripts will run under whatever operating system authority you start Splunk as.  The ability to upload apps (which can contain scripts) is also a feature, and is only available to users who have authenticated to Splunk and have the proper access within Splunk.  &lt;/P&gt;

&lt;P&gt;If your Splunk environment is properly configured and hardened, then your exposure to this vulnerability is limited to "how well can I trust my users with Splunk admin rights?"&lt;/P&gt;

&lt;P&gt;In a potentially hostile environment, many good practices apply, including:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Change the 'admin' password, and/or delete the 'admin' account&lt;/LI&gt;
&lt;LI&gt;Minimize the set of users with admin-equivalent access&lt;/LI&gt;
&lt;LI&gt;Don't run Splunkd or Splunkweb as root&lt;/LI&gt;
&lt;LI&gt;Firewall the Splunkd / Splunkweb TCP ports as appropriate&lt;/LI&gt;
&lt;LI&gt;Establish and enforce a change management policy for app installs / updates&lt;/LI&gt;
&lt;LI&gt;Use Splunk itself to search/alert upon logged events around app changes&lt;/LI&gt;
&lt;LI&gt;Use a file change monitor to look for changes to the scripts within permitted Splunk apps&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;If this cannot provide you with sufficient risk mitigation, it &lt;STRONG&gt;may&lt;/STRONG&gt; be possible to completely disable scripted inputs and other script-calling features within Splunk.  You would do so, however, at a great functionality cost.  If this is the route you wish to take, I would recommend opening a support case and documenting your concerns and asking for help with configuring Splunk to remove as much script-calling functionality as possible.  (Again, you will probably not be happy with this decision functionality-wise)&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2012 21:18:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-5-0-Vulnerability/m-p/74896#M181263</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2012-12-31T21:18:56Z</dc:date>
    </item>
  </channel>
</rss>

