-
Notifications
You must be signed in to change notification settings - Fork 362
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #3023 from splunk/gitlab_release_v4.35.0
Release v4.35.0
- Loading branch information
Showing
88 changed files
with
1,479 additions
and
136 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
56 changes: 56 additions & 0 deletions
56
detections/application/splunk_dos_via_post_request_datamodel_endpoint.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
name: Splunk DoS via POST Request Datamodel Endpoint | ||
id: 45766810-dbb2-44d4-b889-b4ba3ee0d1f5 | ||
version: 1 | ||
status: production | ||
date: '2024-07-01' | ||
author: Rod Soto | ||
type: Hunting | ||
data_source: [] | ||
description: The following is a hunting search that allows investigation of error messages indicating Splunk HTTP engine shutdown as a result of a crafted posted request against '/datamodel/model' endpoint. | ||
search: >- | ||
`splunkd_webs` log_level=INFO message="ENGINE: HTTP Server cherrypy._cpwsgi_server.CPWSGIServer(('127.0.0.1', 8065)) shut down" | ||
| stats count min(_time) as firstTime max(_time) as lastTime by splunk_server message | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `splunk_dos_via_post_request_datamodel_endpoint_filter` | ||
how_to_implement: Need access to the internal indexes. | ||
known_false_positives: This is a hunting search and will produce false positives as other causes can also shut down splunk HTTP engine, however this denial of service error is associated to a request to the datamodel/model endpoing which operator can research and find proximity of request and message in logs. | ||
references: | ||
- https://advisory.splunk.com/advisories/SVD-2024-0710 | ||
cve: | ||
- CVE-2024-36986 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: Splunk Server | ||
cis20: | ||
- CIS 3 | ||
- CIS 5 | ||
- CIS 16 | ||
confidence: 50 | ||
impact: 100 | ||
kill_chain_phases: | ||
- Exploitation | ||
message: Possible Denial of Service attack against $splunk_server$ | ||
mitre_attack_id: | ||
- T1499 | ||
nist: | ||
- DE.CM | ||
observable: | ||
- name: splunk_server | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
required_fields: | ||
- UPDATE | ||
risk_score: 15 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1499/splunk/SVD-2024-0710_web_service_splunk_web_service.log | ||
source: /opt/splunk/var/log/splunk/web_service.log | ||
sourcetype: splunk_web_service | ||
custom_index: _internal |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
60 changes: 60 additions & 0 deletions
60
detections/application/splunk_information_disclosure_on_account_login.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
name: Splunk Information Disclosure on Account Login | ||
id: 2bae5d19-6d1b-4db0-82ab-0af5ac5f836c | ||
version: 1 | ||
date: '2024-07-01' | ||
author: Rod Soto | ||
status: production | ||
type: Hunting | ||
data_source: | ||
- Splunk | ||
description: This is a composed hunting search that looks for possible user enumeration attempts when SAML is enabled on a Splunk instance by capturing different responses from server. | ||
search: '`splunkd` component=UiAuth status=failure action=login TcpChannelThread | ||
| stats count min(_time) as firstTime max(_time) as lastTime by user status action clientip | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `splunk_information_disclosure_on_account_login_filter`' | ||
how_to_implement: Requires access to internal indexes _internal. | ||
known_false_positives: This is a hunting search and requires operator to search for large number of login failures from several users indicating possible user enumeration attempts. May capture genuine login failures. | ||
references: | ||
- https://advisory.splunk.com/SVD-2024-0716 | ||
cve: | ||
- CVE-2024-36996 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: Splunk Server | ||
cis20: | ||
- CIS 3 | ||
- CIS 5 | ||
- CIS 16 | ||
confidence: 50 | ||
impact: 10 | ||
kill_chain_phases: | ||
- Exploitation | ||
message: Possible user enumeration attack against $clientip$ | ||
mitre_attack_id: | ||
- T1087 | ||
nist: | ||
- DE.CM | ||
observable: | ||
- name: clientip | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
required_fields: | ||
- user | ||
- action | ||
- status | ||
- clientip | ||
- host | ||
risk_score: 5 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087/splunk/SVD-2024-0716_splunkd_splunkd.log | ||
source: /opt/splunk/var/log/splunk/splunkd.log | ||
sourcetype: splunkd | ||
custom_index: _internal |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
name: Splunk RCE PDFgen Render | ||
id: bc2b7437-0400-438b-9537-21ab5b7d2d53 | ||
version: 1 | ||
date: '2024-07-01' | ||
status: production | ||
author: Rod Soto, Chase Franklin | ||
type: TTP | ||
data_source: | ||
- Splunk | ||
description: This is a hunting search designed to find and discover exploitation attempts against Splunk pdfgen render endpoint which results in remote | ||
search: 'index=_internal sourcetype=splunk_pdfgen _raw IN ("*base64*", "*lambda*", "*system*") | ||
| stats count min(_time) as firstTime max(_time) as lastTime by index, sourcetype, host, _raw | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `splunk_rce_pdfgen_render_filter`' | ||
how_to_implement: Requires access to internal indexes. | ||
known_false_positives: This search will hunt for exploitation attempts against Splunk PDFgen render function, and not all requests are necesarily malicious so there will be false positives. | ||
references: | ||
- https://advisory.splunk.com/advisories/SVD-2024-0701 | ||
cve: | ||
- CVE-2024-36982 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: Splunk Server | ||
cis20: | ||
- CIS 3 | ||
- CIS 5 | ||
- CIS 16 | ||
confidence: 100 | ||
impact: 80 | ||
kill_chain_phases: | ||
- Exploitation | ||
message: Possible exploitation against $host$ | ||
mitre_attack_id: | ||
- T1210 | ||
nist: | ||
- DE.CM | ||
observable: | ||
- name: host | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
required_fields: | ||
- host | ||
risk_score: 80 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1210/splunk/SVD-2024-0701_pdfgen_log_splunk_pdfgen.log | ||
source: /opt/splunk/var/log/splunk/pdfgen.log | ||
sourcetype: splunk_pdfgen | ||
custom_index: _internal | ||
|
56 changes: 56 additions & 0 deletions
56
detections/application/splunk_rce_via_external_lookup_copybuckets.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
name: Splunk RCE via External Lookup Copybuckets | ||
id: 8598f9de-bba8-42a4-8ef0-12e1adda4131 | ||
version: 1 | ||
date: '2024-07-01' | ||
status: production | ||
author: Rod Soto, Chase Franklin | ||
type: Hunting | ||
data_source: | ||
- Splunk | ||
description: The following detection provides the ability to detect remote code execution attempts against a script named copybuckets present within the splunk_archiver application by calling this script as an external lookup. | ||
search: 'index=_internal sourcetype="splunk_archiver-too_small" *.csv | ||
| rex field=_raw "Invoking command:\s(?<command>.*)" | ||
| stats min(_time) as firstTime max(_time) as lastTime values(command) as command values(severity) as severity by host | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `splunk_rce_via_external_lookup_copybuckets_filter`' | ||
how_to_implement: Requires access to internal indexes | ||
known_false_positives: An operator must identify elements indicatives of command execution requests by looking at regex data being extracted from the log. Not all the requests will be malicious. | ||
references: | ||
- https://advisory.splunk.com/advisories/SVD-2024-0705 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: Splunk Server | ||
cis20: | ||
- CIS 3 | ||
- CIS 5 | ||
- CIS 16 | ||
confidence: 100 | ||
impact: 80 | ||
kill_chain_phases: | ||
- Exploitation | ||
message: Possible exploitation attempt against $host$ | ||
mitre_attack_id: | ||
- T1210 | ||
nist: | ||
- DE.CM | ||
observable: | ||
- name: host | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
required_fields: | ||
- host | ||
risk_score: 80 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1210/splunk/SVD-2024-0705_splunk_archiver_splunk_archiver-too_small.log | ||
source: /opt/splunk/var/log/splunk/splunk_archiver.log | ||
sourcetype: splunk_archiver-too_small | ||
update_timestamp: true | ||
custom_index: _internal |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
57 changes: 57 additions & 0 deletions
57
detections/application/splunk_stored_xss_conf_web_settings_on_premises.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
name: Splunk Stored XSS conf-web Settings on Premises | ||
id: ed1209ef-228d-4dab-9856-be9369925a5c | ||
version: 1 | ||
date: '2024-07-01' | ||
author: Rod Soto, Chase Franklin | ||
status: production | ||
type: Hunting | ||
data_source: | ||
- Splunk | ||
description: This hunting detection provides information on exploitation of stored XSS against /configs/conf-web/settings by an admin level user. | ||
search: '`splunk_python` *script* *eval* | ||
| stats min(_time) as firstTime max(_time) as lastTime by index, sourcetype, host | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `splunk_stored_xss_conf_web_settings_on_premises_filter`' | ||
how_to_implement: Requires access to internal indexes. | ||
known_false_positives: This is a hunting search and will produce false positives, operator must identify XSS elemetns in the splunk_python log related to the vulnerable endpoint. | ||
references: | ||
- https://advisory.splunk.com/advisories/SVD-2024-0717 | ||
cve: | ||
- CVE-2024-36987 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: Splunk Server | ||
cis20: | ||
- CIS 3 | ||
- CIS 5 | ||
- CIS 16 | ||
confidence: 100 | ||
impact: 20 | ||
kill_chain_phases: | ||
- Exploitation | ||
message: Possible XSS attack against $host$ | ||
mitre_attack_id: | ||
- T1189 | ||
nist: | ||
- DE.CM | ||
observable: | ||
- name: host | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
required_fields: | ||
- UPDATE | ||
risk_score: 20 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1189/splunk/SVD-2024-0717_python_log_splunk_python.log | ||
source: /opt/splunk/var/log/splunk/python.log | ||
sourcetype: splunk_python | ||
custom_index: _internal | ||
|
Oops, something went wrong.