I am currently working on a log and filtering data.
Splunk has identified uri_query as a field.
I have come across an event with the uri_query field "src=../../../../wp-config.php".
However, when I try and search uri_query="src=../../../../wp-config.php", Splunk automatically removes "../../../".
This shortens the search to uri_query="src=wp-config.php", causing the search to return with no results.
Any help to solve the issue of "../../../" being removed would be appreciated!
Try putting the search string in double quotes and escaping the (now) embedded double quotes
| makeresults
| eval _raw="blah blah url_query=\"src=../../../../wp-config.php\" blah blah"
| search "url_query=\"src=../../../../wp-config.php\""
Thank you for your help.
Unfortunately the issue is persisting. I have tried manually searching for events using "View events" (see screenshot) however, after clicking, the search still removes "../" , leading to no results.
Before clicking "View events"
After clicking "View events". Note "../" removed.
So the issue is with how the gui sets up the search not with the search itself (when it is modified with the escaped quotes as I showed)?
Which version of splunk are you using?
I was initially searching via the search bar using a method similar to yours. I have tried using the escape quotes as you suggested but again it removes "../".
Version: 8.2.0
Build: e053ef3c985f