HTTP requests containing Java/Spring RCE exploitation patterns
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Detect HTTP requests whose URL, query string, or headers contain Java or Spring-related remote code execution patterns.
Strategy
This rule monitors OCSF HTTP fields for payloads referencing runtime execution, class loaders, or Spring Cloud Function routing constructs, grouped by @ocsf.src_endpoint.ip.
Triage and response
- Validate whether the application stack is Java or Spring and whether the payloads could reach a vulnerable code path.
- If exploitation is plausible, isolate affected services and follow your RCE incident response process.