Description
Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, because the non-root setup instructions state that chown should be run across all of $SPLUNK_HOME to give non-root access.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_misc
https://www.splunk.com/view/SP-CAAAP3M
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/101664
Exploit, Third Party Advisory x_refsource_misc
https://korelogic.com/Resources/Advisories/KL-001-2017-022.txt
Scores
CVSS v3
7.0
EPSS
0.0012
EPSS Percentile
30.1%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-732
Status
published
Products (1)
splunk/splunk
6.6.0 - 6.6.11
Published
Oct 19, 2018
Tracked Since
Feb 18, 2026