HTTP requests containing Java/Spring RCE exploitation patterns

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect HTTP requests whose URL, query string, or headers contain Java or Spring-related remote code execution patterns.

Strategy

This rule monitors OCSF HTTP fields for payloads referencing runtime execution, class loaders, or Spring Cloud Function routing constructs, grouped by @ocsf.src_endpoint.ip.

Triage and response

  • Validate whether the application stack is Java or Spring and whether the payloads could reach a vulnerable code path.
  • If exploitation is plausible, isolate affected services and follow your RCE incident response process.