module

Splunk Custom App Remote Code Execution

Disclosed
Sep 27, 2012
Created
May 30, 2018

Description

This module exploits a feature of Splunk whereby a custom application can be
uploaded through the web based interface. Through the 'script' search command a
user can call commands defined in their custom application which includes arbitrary
perl or python code. To abuse this behavior, a valid Splunk user with the admin
role is required. By default, this module uses the credential of "admin:changeme",
the default Administrator credential for Splunk. Note that the Splunk web interface
runs as SYSTEM on Windows, or as root on Linux by default. This module has been
tested successfully against Splunk 5.0, 6.1, 6.1.1 and 7.2.4.
Version 7.2.4 has been tested successfully against OSX as well

Authors

marcwickenden
sinn3r [email protected]
juan vazquez [email protected]
Gary Blosser
Matteo Malvica

Platform

Linux,OSX,Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/splunk_upload_app_exec
msf exploit(splunk_upload_app_exec) > show targets
...targets...
msf exploit(splunk_upload_app_exec) > set TARGET < target-id >
msf exploit(splunk_upload_app_exec) > show options
...show and set options...
msf exploit(splunk_upload_app_exec) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.