[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <002601cd8c04$39c0d8f0$ad428ad0$@itsecuritypros.org>
Date: Thu, 6 Sep 2012 03:50:03 -0400
From: "Michael D. Wood" <mike@...ecuritypros.org>
To: "'JxT'" <jxt.lists@...il.com>,
"'Zach C.'" <fxchip@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Splunk Vulnerability
I agree. Splunk *IS* doing what it was designed to do.
--
Michael D. Wood
ITSecurityPros.org
www.itsecuritypros.org
From: JxT [mailto:jxt.lists@...il.com]
Sent: Thursday, September 06, 2012 2:19 AM
To: Zach C.
Cc: Michael D. Wood; full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Splunk Vulnerability
On Wed, Sep 5, 2012 at 11:30 PM, Zach C. <fxchip@...il.com> wrote:
1.) The tool, Splunk, is designed to index logs
2.) Logs are arbitrary files.
Therefore,
3.) Splunk is designed to index arbitrary files.
Agreed, Splunk is doing exactly what it's designed to do. This is not a
vulnerability within Splunk itself.
Content of type "text/html" skipped
Download attachment "smime.p7s" of type "application/pkcs7-signature" (6139 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists