Reporter Filip Palian
`-- Product description:
Splunk collects, indexes and harnesses the massive volumes of valuable
machine data generated by your complex IT infrastructure, whether
physical, virtual or in the cloud.
-- Vulnerable product:
The vulnerability was found and tested on splunk-4.2.2-101277-linux-2.6-x86_64.
-- Problem Description:
The script "splunk/lib/python2.6/site-packages/splunk/appserver/mrsparkle/controllers/prototype.py"
is prone to lack of user input validation resulting in reflected XSS
(yes, I have them enough too) and denial of service (operating system
freez). Below some details are included.
No authentication in Splunk was required to successfuly conduct the attacks.
-- Proof Of Concept:
little bonus - Information disclosure:
Possible disclosure of the valid Splunk session key, full system
resources exhaustion resulting, sensitive information disclosure.
-- Disclosure timeline:
2011.08.25: detailed information about vulnerability and PoC sent to vendor
2011.08.25: vendor response
2011.10.19: vendor released official fixes
2011.10.19: advisory released
as always... goes to folks from #dragonfly