- Type: Hunting
Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- Last Updated: 2023-09-05
- Author: Rod Soto
- ID: 182f9080-4137-4629-94ac-cb1083ac981a
Kill Chain Phase
- CIS 10
1 2 3 4 5 `splunkd_web` (dataset_commands="*makeresults*" AND dataset_commands="*count*" AND dataset_commands="*eval*" AND dataset_commands="*baseSPL*") | stats count min(_time) as firstTime max(_time) as lastTime by clientip status user view root uri_path | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `splunk_reflected_xss_on_app_search_table_endpoint_filter`
The SPL above uses the following Macros:
splunk_reflected_xss_on_app_search_table_endpoint_filter is a empty macro by default. It allows the user to filter out any results (false positives) without editing the SPL.
List of fields required to use this analytic.
How To Implement
Need access to the internal indexes.
Known False Positives
This search will produce false positives. It is necessary to also look at uri_query parameter to determine the possible malicious intention of inserting makeresults within the uri string.
Associated Analytic Story
|12.0||30||40||Possible XSS attack against from $user$|
The Risk Score is calculated by the following formula: Risk Score = (Impact * Confidence/100). Initial Confidence and Impact is set by the analytic author.
source | version: 1