- 重要な情報
- アプリ内
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Classification:
attack
Detect Java code injections attempts on web services executing OGNL expressions. Such security activity generally indicates that an attacker is trying to discover and exploit a potential OGNL code injection which can turn into a Remote Code Execution.
OGNL is an expression language that lets an application execute dynamic code in the application context. The expression starts as a string and can be made to execute. Upon execution, it is able to read or set access to Java objects available in its context, or call methods. OGNL injection is powerful and can achieve total takeover of an application.
Monitor application security events to detect OGNL payloads (@appsec.rule_id:(dog-000-002 OR dog-000-003)
) or more generic Java code injection payloads (@appsec.type:java_code_injection
) on distributed traces where OGNL expressions are compiled (@_dd.appsec.enrichment.has_ognl:true
).
Generate an Application Security Signal with MEDIUM
severity if the payload is OGNL specific, LOW
if generic.