HTTP requests containing Java/Spring RCE exploitation patterns

이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect HTTP requests whose URL, query string, or headers contain Java or Spring-related remote code execution patterns.

Strategy

This rule monitors OCSF HTTP fields for payloads referencing runtime execution, class loaders, or Spring Cloud Function routing constructs, grouped by @ocsf.src_endpoint.ip.

Triage and response

  • Validate whether the application stack is Java or Spring and whether the payloads could reach a vulnerable code path.
  • If exploitation is plausible, isolate affected services and follow your RCE incident response process.