Jan. 16, 2024, 5:30 p.m. | Elnur Badalov

System Weakness - Medium systemweakness.com

SOC239 — Remote Code Execution Detected in Splunk Enterprise

Event ID: 201
Platform: LetsDefend

Cover

Alert

Alert

Based on the information provided in this alert, on the host Splunk Enterprise with IP 172[.]16[.]20[.]13, remote code was injected from 180[.]101[.]88[.]240. The malicious actor injected remote code using an XSLT payload.

Definition:
Extensible Stylesheet Language Transformations (XSLT) is an XML-based language used, in conjunction with specialized processing software, for the transformation of XML documents.

No action was taken on this alert …

blue team cybersecurity incident response letsdefendio rce-vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

COMM Penetration Tester (PenTest-2), Chantilly, VA OS&CI Job #368

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Consultant Sécurité SI H/F Gouvernance - Risques - Conformité

@ Hifield | Sèvres, France

Infrastructure Consultant

@ Telefonica Tech | Belfast, United Kingdom