T1190 Exploit Public-Facing Application
T1059 Command and Scripting Interpreter
T1105 Ingress Tool Transfer
T1136 Create Account
T1505.003 Server Software Component
External Source IP 180.101.88.240 (geolocated to China) accessed Splunk Enterprise hosted at 172.16.20.13 / 18.219.80.54. The actor authenticated to Splunk using admin credentials and subsequently uploaded a malicious XSLT file to achieve remote code execution.
A high severity alert (SOC239) detected exploitation of a Splunk Enterprise vulnerability via malicious XSLT upload (Splunk App for Lookup File Editing RCE). The attacker performed a POST request to:
/en-US/splunkd/__upload/indexing/preview?output_mode=json&props.NO_BINARY_CHECK=1&input.path=shell.xsl
The upload triggered remote code execution, resulting in shell access. Post-exploitation activity included:
whoami
groups
useradd -m analsyt
passwd analsyt
The attacker created a new user account for persistence and executed commands indicating interactive shell access. Reverse shell activity was observed. Device action was Allowed.
Event Time Nov 21, 2023 12:24 PM
Initial Login Nov 21, 2023 12:23:56
Command Execution 12:24:33 – 12:24:48
User Account Creation 12:24:40
Containment initiated shortly after detection
Affected Host Splunk Enterprise
Internal IP 172.16.20.13
Public IP 18.219.80.54
Malicious Source IP 180.101.88.240
Uploaded File Path /opt/splunk/var/run/splunk/dispatch/1700556926.3/shell.xsl
Access Vector Splunk Web Interface (Port 8000)
The threat actor exploited a remote code execution vulnerability in Splunk Enterprise via malicious XSLT upload to gain shell access. Following successful exploitation, the attacker enumerated privileges and established persistence by creating a new local user account. The activity demonstrates full interactive command execution capability and potential for lateral movement or data exfiltration.
Assessment
True Positive. Confirmed remote code execution with interactive shell access and persistence established via local user creation. Immediate containment performed, including host isolation and escalation for incident response, credential rotation, and forensic acquisition.