CVE-2017-18348

HIGH

Splunk < 6.6.11 - Incorrect Permission Assignment

Title source: rule
STIX 2.1

Description

Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, because the non-root setup instructions state that chown should be run across all of $SPLUNK_HOME to give non-root access.

References (3)

Core 3
Core References
Vendor Advisory x_refsource_misc
https://www.splunk.com/view/SP-CAAAP3M
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/101664
Exploit, Third Party Advisory x_refsource_misc
https://korelogic.com/Resources/Advisories/KL-001-2017-022.txt

Scores

CVSS v3 7.0
EPSS 0.0012
EPSS Percentile 30.1%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-732
Status published
Products (1)
splunk/splunk 6.6.0 - 6.6.11
Published Oct 19, 2018
Tracked Since Feb 18, 2026