-
Notifications
You must be signed in to change notification settings - Fork 360
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'release_v4.14.0' into update_50_detections
- Loading branch information
Showing
387 changed files
with
7,766 additions
and
6,363 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
56 changes: 29 additions & 27 deletions
56
bin/contentctl_project/contentctl_infrastructure/adapter/templates/finding_report.j2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,28 +1,30 @@ | ||
|
||
| eval body=create_map( | ||
"devices", [ | ||
create_map( | ||
"hostname", device_hostname, "type_id", 0, "uuid", ucast(map_get(device,"uuid"), "string", null) | ||
) | ||
], | ||
"time", timestamp, | ||
"evidence", {{ detection.tags.evidence_str }}, | ||
"message", concat("{{ detection.name }} has been triggered on ", device_hostname, " by ", {{ actor_user_name }}, "."), | ||
"users", [ | ||
create_map( | ||
"name", {{ actor_user_name }}, "uid", ucast(map_get(actor_user,"uid"), "string", null) | ||
) | ||
], | ||
"activity_id", 1, | ||
"category_uid", 2, | ||
"class_uid", 102001, | ||
"risk_level_id", {{ detection.tags.risk_level_id }}, | ||
"risk_score", {{ detection.tags.risk_score }}, | ||
"severity_id", 0, | ||
"rule", create_map("name", "{{ detection.name }}", "uid", "{{ detection.id }}", "type", "Streaming"), | ||
"metadata", create_map("customer_uid", ucast(map_get(metadata,"customer_uid"), "string", null), "product", create_map("name", "Behavior Analytics", "vendor_name", "Splunk"), "version", "1.0.0-rc.2", "logged_time", time()), | ||
"type_uid", 10200101, | ||
"start_time", timestamp, | ||
"end_time", timestamp | ||
) | ||
| into write_ba_finding_events(); | ||
| eval devices = [{"hostname": device_hostname, "type_id": 0, "uuid": device.uuid}], | ||
time = timestamp, | ||
evidence = {{ detection.tags.evidence_str }}, | ||
message = "{{ detection.name }} has been triggered on " + device_hostname + " by " + {{ actor_user_name }} + ".", | ||
users = [{"name": {{ actor_user_name }}, "uid": actor_user.uid}], | ||
activity_id = 1, | ||
cis_csc = [{"control": "CIS 10", "version": 8}], | ||
analytic_stories = {{ detection.tags.analytics_story_str }}, | ||
class_name = "Detection Report", | ||
confidence = {{ detection.tags.confidence }}, | ||
confidence_id = {{ detection.tags.confidence_id }}, | ||
duration = 0, | ||
impact = {{ detection.tags.impact }}, | ||
impact_id = {{ detection.tags.impact_id }}, | ||
kill_chain = {{ detection.tags.kill_chain_phases_str }}, | ||
nist = ["DE.AE"], | ||
risk_level = "{{ detection.tags.risk_level }}", | ||
category_uid = 2, | ||
class_uid = 102001, | ||
risk_level_id = {{ detection.tags.risk_level_id }}, | ||
risk_score = {{ detection.tags.risk_score }}, | ||
severity_id = 0, | ||
rule = {"name": "{{ detection.name }}", "uid": "{{ detection.id }}", "type": "Streaming"}, | ||
metadata = {"customer_uid": metadata.customer_uid, "product": {"name": "Behavior Analytics", "vendor_name": "Splunk"}, "version": "1.0.0-rc.2", "logged_time": time()}, | ||
type_uid = 10200101, | ||
start_time = timestamp, | ||
end_time = timestamp | ||
| fields metadata, rule, activity_id, analytic_stories, cis_csc, category_uid, class_name, class_uid, confidence, confidence_id, devices, duration, time, evidence, impact, impact_id, kill_chain, message, nist, observables, risk_level, risk_level_id, risk_score, severity_id, type_uid, users, start_time, end_time | ||
| into sink; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
58 changes: 58 additions & 0 deletions
58
detections/application/splunk_absolute_path_traversal_using_runshellscript.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
name: Splunk Absolute Path Traversal Using runshellscript | ||
id: 356bd3fe-f59b-4f64-baa1-51495411b7ad | ||
version: 1 | ||
date: '2023-09-05' | ||
author: Rod Soto | ||
status: production | ||
type: Hunting | ||
data_source: [] | ||
description: In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk. | ||
search: > | ||
`splunk_python` *runshellscript* | ||
| eval log_split=split(_raw, "runshellscript: ") | ||
| eval array_raw = mvindex(log_split,1) | ||
| eval data_cleaned=replace(replace(replace(array_raw,"\[",""),"\]",""),"'","") | ||
| eval array_indices=split(data_cleaned,",") | ||
| eval runshellscript_args_count=mvcount(array_indices) | ||
| where runshellscript_args_count = 10 | ||
| eval interpreter=mvindex(array_indices,0) | ||
| eval targetScript=mvindex(array_indices,1) | ||
| eval targetScript != "*C:*" | ||
| stats count min(_time) as firstTime max(_time) as lastTime by splunk_server interpreter targetScript | ||
| `security_content_ctime(firstTime)`| `security_content_ctime(lastTime)` | ||
| `splunk_absolute_path_traversal_using_runshellscript_filter` | ||
how_to_implement: Must have access to internal indexes. Only applies to Splunk on Windows versions. | ||
known_false_positives: The command runshellscript can be used for benign purposes. Analyst will have to review the searches and determined maliciousness specially by looking at targeted script. | ||
references: | ||
- https://advisory.splunk.com/advisories/SVD-2023-0806 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: endpoint | ||
confidence: 70 | ||
impact: 50 | ||
message: Possible attack against splunk_server $splunk_server$ through abuse of the runshellscript command | ||
mitre_attack_id: | ||
- T1083 | ||
cve: | ||
- CVE-2023-40597 | ||
observable: | ||
- name: splunk_server | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
risk_score: 35 | ||
required_fields: | ||
- search | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1083/splunk/splunk_absolute_path_traversal_using_runshellscript_splunk_python.log | ||
source: python.log | ||
sourcetype: splunk_python | ||
custom_index: _internal |
Oops, something went wrong.