-
Notifications
You must be signed in to change notification settings - Fork 374
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'release_v4.28.0' into 'develop'
Release Branch : v4.28.0 See merge request threat-research/security_content!1446
- Loading branch information
Showing
13 changed files
with
108 additions
and
33 deletions.
There are no files selected for viewing
54 changes: 54 additions & 0 deletions
54
detections/application/splunk_authentication_token_exposure_in_debug_log.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
name: Splunk Authentication Token Exposure in Debug Log | ||
id: 9a67e749-d291-40dd-8376-d422e7ecf8b5 | ||
version: 1 | ||
date: '2024-03-18' | ||
author: Rod Soto, Chase Franklin | ||
type: TTP | ||
status: production | ||
data_source: [] | ||
description: This detection search finds exposed authentication tokens in debug logs. This issue occurs in Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, which may be affected by a vulnerability where JsonWebTokens can be exposed if the log level is set to DEBUG. | ||
search: '`splunkd` component=JsonWebToken log_level=DEBUG eventtype="splunkd-log" event_message="Validating token:*" | ||
| rex "Validating token: (?<token>.*)\.$" | ||
| search token!=None | ||
| stats count min(_time) as firstTime max(_time) as lastTime values(log_level) as log_level values(event_message) as event_message by index, sourcetype, host, token | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `splunk_authentication_token_exposure_in_debug_log_filter`' | ||
how_to_implement: Requires access to internal Splunk indexes. | ||
known_false_positives: Only applies to affected versions of Splunk Enterprise below 9.2.1, 9.1.4, and 9.0.9 | ||
references: | ||
- https://advisory.splunk.com/advisories/SVD-2024-0301 | ||
tags: | ||
analytic_story: | ||
- Splunk Vulnerabilities | ||
asset_type: endpoint | ||
confidence: 100 | ||
cve: | ||
- CVE-2024-29945 | ||
impact: 50 | ||
message: Possible JsonWebToken exposure, please investigate affected $host$ | ||
mitre_attack_id: | ||
- T1654 | ||
observable: | ||
- name: host | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Cloud | ||
required_fields: | ||
- component | ||
- log_level | ||
- eventtype | ||
- event_message | ||
- host | ||
risk_score: 50 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1654/splunk/jsonwebtokenplaintokensvd_splunkd.log | ||
source: /opt/splunk/var/log/splunk/splunkd.log | ||
sourcetype: splunkd | ||
custom_index: _internal |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -88,8 +88,11 @@ attack_range_escu_app: | |
push_sse_json_to_artifactory: | ||
stage: release | ||
needs: | ||
- app_inspect | ||
- github_push_develop | ||
before_script: | ||
- 'NEW_VERSION=$(echo $CI_COMMIT_TAG | sed "s/^v//")' | ||
- 'echo "Updating contentctl.yml version: $NEW_VERSION"' | ||
- 'sed -i "s/version: [0-9]*\.[0-9]*\.[0-9]*/version: $NEW_VERSION/" contentctl.yml' | ||
- pip3 install poetry | ||
- git submodule update --init contentctl | ||
- cd contentctl | ||
|
@@ -101,7 +104,7 @@ push_sse_json_to_artifactory: | |
script: | ||
- creds-helper init | ||
- eval $(creds-helper artifactory --eval $ARTIFACTORY_GENERIC_WRITE_ROLE) | ||
- curl -u $ARTIFACTORY_AUTHORIZATION -X PUT $ARTIFACTORY_BASE_URL/generic/threat-research-security-content/$CI_COMMIT_TAG/sse.tar.gz -T sse.tar.gz | ||
- curl -u $ARTIFACTORY_AUTHORIZATION -X PUT $ARTIFACTORY_BASE_URL/generic/threat-research-security-content/$CI_COMMIT_TAG/$CI_PIPELINE_ID/sse.tar.gz -T sse.tar.gz | ||
rules: | ||
- if: '$CI_COMMIT_TAG =~ /^v[0-9]+\.[0-9]+\.[0-9]$/' | ||
|
||
|
@@ -116,6 +119,7 @@ trigger_downstream_sse_json_release: | |
variables: | ||
UPSTREAM_ESCU_VERSION: $CI_COMMIT_TAG | ||
IS_DOWNSTREAM_SSE_JSON_RELEASE: "True" | ||
PARENT_PIPELINE_ID: $CI_PIPELINE_ID | ||
trigger: | ||
project: securitycontent/security-content-automation | ||
branch: main | ||
|
@@ -148,6 +152,10 @@ update_gitlab_dist: | |
- artifacts/* | ||
expire_in: 14 days | ||
before_script: | ||
- 'echo "Current CI_COMMIT_TAG: $CI_COMMIT_TAG"' | ||
- 'NEW_VERSION=$(echo $CI_COMMIT_TAG | sed "s/^v//")' | ||
- 'echo "Updating contentctl.yml version: $NEW_VERSION"' | ||
- 'sed -i "s/version: [0-9]*\.[0-9]*\.[0-9]*/version: $NEW_VERSION/" contentctl.yml' | ||
- pip3 install poetry | ||
- git submodule update --init contentctl | ||
- cd contentctl | ||
|
@@ -164,10 +172,7 @@ update_gitlab_dist: | |
- git remote set-url origin https://PUSH_DIST_VIA_CI:[email protected]/threat-research/security_content.git | ||
- git fetch --all | ||
- git checkout develop | ||
- 'echo "Current CI_COMMIT_TAG: $CI_COMMIT_TAG"' | ||
- 'NEW_VERSION=$(echo $CI_COMMIT_TAG | sed "s/^v//")' | ||
- 'echo "Updating contentctl.yml version: $NEW_VERSION"' | ||
- 'sed -i "s/version: [0-9]*\.[0-9]*\.[0-9]*/version: $NEW_VERSION/" contentctl.yml' | ||
- git add contentctl.yml | ||
- git add dist/api/* | ||
- git add dist/DA-ESS-ContentUpdate/* | ||
- git add dist/ssa/* | ||
|
@@ -206,6 +211,10 @@ github_push_develop: | |
- git checkout -b $BRANCH | ||
- git config merge.submodule ignore | ||
- git merge github_origin/develop -X theirs || true | ||
# Update contentctl.yml version after merge with theirs | ||
- 'NEW_VERSION=$(echo $CI_COMMIT_TAG | sed "s/^v//")' | ||
- 'echo "Updating contentctl.yml version: $NEW_VERSION"' | ||
- 'sed -i "s/version: [0-9]*\.[0-9]*\.[0-9]*/version: $NEW_VERSION/" contentctl.yml' | ||
- cd contentctl && git checkout main && cd .. | ||
- git add contentctl | ||
- cd contentctl/ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters