跳转到帖子

Splunk "edit_user" Capability Privilege Escalation

recommended_posts

发布于
  • Members

Splunk "edit_user" Capability Privilege Escalation

Disclosed
06/01/2023
Created
10/26/2023

Description

A low-privileged user who holds a role that has the "edit_user" capability assigned to it can escalate their privileges to that of the admin user by providing a specially crafted web request. This is because the "edit_user" capability does not honor the "grantableRoles" setting in the authorize.conf configuration file, which prevents this scenario from happening. This exploit abuses this vulnerability to change the admin password and login with it to upload a malicious app achieving RCE.

Author(s)

  • Mr Hack (try_to_hack) Santiago Lopez
  • Heyder Andrade
  • Redway Security <redwaysecurity.com>

Platform

Linux,OSX,Unix,Windows

Development

  • Source Code
  • History
  • 查看数 698
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…