Splunk 6.6.x Local Privilege Escalation

Discussion in 'News Aggregator' started by Packet Storm, 4 Nov 2017.

  1. Packet Storm

    Packet Storm Guest

    Splunk version 6.6.x suffers from a local privilege escalation vulnerability. Splunk can be configured to run as a non-root user. However, that user owns the configuration file that specifies the user to run as, so it can trivially gain root privileges.

    Continue reading...
     

Share This Page

Loading...