HTTP requests containing Log4Shell JNDI injection patterns

이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect HTTP requests containing Log4Shell-style JNDI lookup strings in the query string, path, headers, or user agent.

Strategy

This rule monitors OCSF HTTP activity for JNDI injection patterns across multiple request attributes, grouped by @ocsf.src_endpoint.ip.

Triage and response

  • Confirm whether affected systems run vulnerable Log4j versions and whether lookups could have been evaluated.
  • Apply vendor patches or mitigations for affected production assets.