SOC239 — Remote Code Execution Detected in Splunk Enterprise (LetsDefend)

November 03, 2025 · Brandon Love · Tags: lets-defend, cybersecurity, letsdefendio

Originally published on Medium: https://medium.com/@brandonlove2150/soc239-remote-code-execution-detected-in-splunk-enterprise-letsdefend-34b36bd92fff?source=rss-024d132ba4b7——2

cdn-images-1.medium.com/max/937/1*VaQMHSrRmbiixTw8d1dIjg.png) SOC Alert ### Walkthrough Today, I completed another alert from LetsDefend regarding a Remote Code Execution Detected in Splunk Enterprise.

SOC239 — Remote Code Execution Detected in Splunk Enterprise (LetsDefend)

SOC Alert

Walkthrough

Today, I completed another alert from LetsDefend regarding a Remote Code Execution Detected in Splunk Enterprise. After reviewing this alert, I searched the Log Management system using the source IP address 180.101.88.240 and found that the IP address had contacted our internal Host with the hostname Splunk Enterprise, which has the IP address 172.16.20.13. It requested http://18.219.80.54:8000/en-US/splunkd/__upload/indexing/preview?output_mode=json&props.NO_BINARY_CHECK=1&input.path=shell.xsl.

Log Management

Source Logs

This is only the first half of the investigation, though. We need to search for the endpoint IP address 172.16.20.13. Examining the exact time as recorded in our log, we can see that the same request was made on this end and was successful. Immediately after this, we can see that a new username and password have been created, as shown in the image above.

To confirm that everything matches up, I reviewed the Endpoint Security tab of the Host. Examining these logs, we can see that a user was added, and the whoami, groups, useradd, and passwd commands were executed on the host.

Endpoint Security

After collecting all this evidence, it’s time to search the source IP address on VirusTotal to see if we can gather any additional information.

VirusTotal

As you can see, the IP address is flagged as malicious. We can now answer the playbook question, having gathered all the necessary information.

Playbook pt 1

Playbook pt 2

Analyst Notes

On November 21, 2023, at 12:24 p.m., an alert was triggered for a remote code execution detected in Splunk Enterprise.

The Source IP address is 180.101.88.240, and it targeted 172.16.20.13, trying to request this URL http://18.219.80.54:8000/en-US/splunkd/__upload/indexing/preview?output_mode=json&props.NO_BINARY_CHECK=1&input.path=shell.xsl.

This vulnerability aligns with CVE-2023–46214, Which Involves Remote code execution (RCE) in Splunk Enterprise due to insecure XML Parsing.

The attacker was able to log in and create a new account on the Splunk Enterprise host.

I recommend containment for the host. Change the passwords and delete the new user account created. Updating and patching to the latest version available is highly essential. Recommend continuing to monitor this host for further activity and escalating to Tier 2.

Completion

Summary

The attacker gained access to the Splunk Enterprise-hosted endpoint using the XML injection method. They were able to create a new user and password. The recommendation is to reset all passwords, delete the newly created user, block the source IP address, contain the endpoint, update and patch to the latest version, and continue to monitor for suspicious behavior coming from Spluck Enterprise.

Originally published on Medium: https://medium.com/@brandonlove2150/soc239-remote-code-execution-detected-in-splunk-enterprise-letsdefend-34b36bd92fff?source=rss-024d132ba4b7------2

lets-defendcybersecurityletsdefendio
PHP-CGI (CVE-2024–4577)(LetsDefend)
Brutus (hackthebox)