The Splunk App for VulDB integrates vulnerability intelligence from VulDB into Splunk. The app communicates with VulDB by using its API and requires a valid API key as well as sufficient API credits.
|3.7.2||07/26/2022||Improved secret storage application|
|3.7.0||20/12/2021||New VulDB logo; added support for Chinese (zh), Japanese (ja) and Arabic (ar); stability improvements|
|3.6.0||08/13/2021||Added MITRE ATT&CK techniques visualization; stability improvements|
|3.5.2||12/13/2020||Improved data retrieval strategy|
|3.5.1||10/16/2020||Improved handling of arbitrarily named indices|
|3.5.0||07/09/2020||Enhanced algorithm for update fetching|
|3.4.0||01/21/2020||Fetch updates more frequently; show important warnings as Bulletin Messages|
|3.3.0||12/17/2019||New feature to allow fetching individual vulnerabilities|
|3.1.0||06/06/2019||Use the storage passwords facility to store the API key|
|3.0.0||03/21/2019||Retrieve updates for vulnerabilities|
|2.0.0||02/11/2019||New and improved dashboards, user interface improvements, and 0day exploit prices|
|1.0.1||10/11/2018||Possibility to define the time-range to fetch earlier entries at the initial startup|
- Log in to Splunk with an administrative account
- Click on the gear icon (Manage Apps)
- On the next screen, click on the button labeled Install app from file
- Click on the button Browse... and browse to the location of the the VulDB Splunk App file (VulDB-Splunk-App.tar.gz), then select that file and click Open in the file browser dialogue. Now the name of the file appears next to the button Browse....
- Check the checkbox Upgrade app to upgrade any older versions of the app should they exist
- Click the button labeled Upload
Before configuring the VulDB Splunk App for the first time, make sure that you have a valid API key and a sufficient amount of API credits. If in doubt, log in to your VulDB account and check your profile.
The VulDB Splunk App defines a new modular input type that is used for retrieving data from VulDB. Navigate to the menu Settings / Data inputs and click on + Add new.
Note: if the app has been configured previously, this step is typically not required as the required configuration should already be present.
Give the new modular input a name, for example VulDB-datasrc and insert your API key into the field "VulDB API key". Optionally, you can specify a proxy server for outgoing connections, i.e. connections to https://vuldb.com from your Splunk server. You can also choose the language for the data fetched from VulDB, the choices are (actual setting in parentheses):
- English (en)
- German (de)
- Spanish (es)
- French (fr)
- Italian (it)
- Polish (pl)
- Swedish (sv)
- Chinese (zh)
- Japanese (jp)
- Arabic (ar)
The VulDB Splunk App downloads data from https://vuldb.com in chunks of 100 database entries and it checks for new data once per hour. Upon initial data download (i.e. no data has been downloaded previously or data is older than one month), the App attempts to download all data from VulDB that is newer than one month.
Note: this will consume roughly 1'000 API credits (or more), depending on your choice of fetching details and on the amount of vulnerabilities in VulDB for that period.
When you access the Splunk App, you are presented with an overview dashboard. This dashboard shows some statistics and visualizations of the VulDB data present in your Splunk instance. All visualizations in the overview have drilldowns defined, i.e. clicking on the numbers or graph elements will open a new window containing relevant data and details.
Some predefined dashboards are included with the app. They can be accessed through the menu Dashboards in the menu bar.
You can always add your own dashboards or alter the existing ones. If you choose to change any of the predefined dashboards be aware that this may lead to non-functioning drilldowns in other dashboards.
Reports and Saved Queries
Currently, only one saved search is included with the VulDB app - it will show the VulDB log entries. Feel free to add your own searches as you see fit.
The VulDB app creates Splunk entries with a sourcetype of
VulDB. Therefore you can use
`sourcetype=VulDB` to restrict Splunk searches to VulDB data.
The VulDB Splunk App logs events to the splunk logs. A saved search is included in the VulDB app that allows you to retrieve the VulDB App logs, please click on the Reports menu access the saved search.
Changing the Splunk App Configuration
The configuration of the VulDB data source (modular input) can be changed. Click on Settings / Data inputs / VulDB, which will show the previously defined input (or an empty list if you haven't defined the input yet). Clicking on the name of the input allows you to change its parameters.
Updating the App
For instructions on how to update Splunk apps, please refer to the official Splunk documentation
Deleting the App
For instructions on how to disable or delete Splunk apps please refer to the official Splunk documentation.
Bear in mind that deleting the app will remove the defined modular input but will not remove the VulDB data already present in your Splunk instance.
Help and Support
Might our Artificial Intelligence support you?
Check our Alexa App!