Splunk 6.6.x Local Privilege Escalation
Posted by deepcore on November 5, 2017 – 6:26 pm
Splunk version 6.6.x suffers from a local privilege escalation vulnerability. Splunk can be configured to run as a non-root user. However, that user owns the configuration file that specifies the user to run as, so it can trivially gain root privileges.
Post a reply
You must be logged in to post a comment.