LoFP LoFP / this search will produce false positives. it is necessary to also look at uri_query parameter to determine the possible malicious intention of inserting makeresults within the uri string.

Techniques

Sample rules

Splunk Reflected XSS on App Search Table Endpoint

Description

In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting XSS on the app search table web endpoint, which presents as the Create Table View page in Splunk Web. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance. A JavaScript file within this web endpoint does not properly validate input which lets an attacker insert a payload into a function.

Detection logic

`splunkd_web` (dataset_commands="*makeresults*" AND dataset_commands="*count*" AND dataset_commands="*eval*" AND dataset_commands="*baseSPL*") 
| stats count min(_time) as firstTime max(_time) as lastTime by clientip status user view root uri_path 
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)` 
| `splunk_reflected_xss_on_app_search_table_endpoint_filter`