Skip to content

Commit 2b4e96f

Browse files
authored
Merge pull request #2788 from splunk/rodbh
Rodbh
2 parents 68b47d1 + 8a05a0f commit 2b4e96f

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
name: Splunk Unauthenticated Log Injection Web Service Log
2+
id: de3908dc-1298-446d-84b9-fa81d37e959b
3+
version: 1
4+
date: '2023-07-13'
5+
author: Rod Soto
6+
status: production
7+
type: Hunting
8+
data_source: []
9+
description: An attacker can use a specially crafted web URL in their browser to cause log file injection, in which the attack inserts American National Standards Institute (ANSI) escape codes into specific files using a terminal program that supports those escape codes. The attack requires a terminal program that supports the translation of ANSI escape codes and requires additional user interaction to successfully execute. This following analytic detects potential log injection attempts into the Splunk server.
10+
search: '`splunkd_webx` uri_path IN ("*\x1B*", "*\u001b*", "*\033*", "*\0x9*", "*\0x8*") | stats count by uri_path method host status clientip | `splunk_unauthenticated_log_injection_web_service_log_filter`'
11+
how_to_implement: This only affects web enabled Splunk instances. The detection does require the ability to search the _internal index.
12+
known_false_positives: This hunting search will produce false positives if ANSI escape characters are included in URLs either voluntarily or by accident. This search will not detect obfuscated ANSI characters.
13+
references:
14+
- https://advisory.splunk.com/advisories/SVD-2023-0606
15+
tags:
16+
analytic_story:
17+
- Splunk Vulnerabilities
18+
asset_type: Endpoint
19+
confidence: 30
20+
impact: 30
21+
message: Possible Splunk unauthenticated log injection web service log exploitation attempt against $host$ from $clientip$
22+
cve:
23+
- CVE-2023-32712
24+
mitre_attack_id:
25+
- T1190
26+
observable:
27+
- name: host
28+
type: Hostname
29+
role:
30+
- Victim
31+
- name: clientip
32+
type: IP Address
33+
role:
34+
- Attacker
35+
product:
36+
- Splunk Enterprise
37+
- Splunk Enterprise Security
38+
- Splunk Cloud
39+
risk_score: 9
40+
required_fields:
41+
- method
42+
- uri_path
43+
- host
44+
- status
45+
- clientip
46+
security_domain: endpoint
47+
tests:
48+
- name: True Positive Test
49+
attack_data:
50+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/splunk/web_access.log
51+
source: /opt/splunk/var/log/splunk/web_access.log
52+
custom_index: _internal
53+
sourcetype: splunk_web_access
54+

0 commit comments

Comments
 (0)