---
title: HTTP requests containing Java/Spring RCE exploitation patterns
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > HTTP requests containing Java/Spring
  RCE exploitation patterns
---

# HTTP requests containing Java/Spring RCE exploitation patterns
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1190-exploit-public-facing-application](https://attack.mitre.org/techniques/T1190) 
## Goal{% #goal %}

Detect HTTP requests whose URL, query string, or headers contain Java or Spring-related remote code execution patterns.

## Strategy{% #strategy %}

This rule monitors OCSF HTTP fields for payloads referencing runtime execution, class loaders, or Spring Cloud Function routing constructs, grouped by `@ocsf.src_endpoint.ip`.

## Triage and response{% #triage-and-response %}

- Validate whether the application stack is Java or Spring and whether the payloads could reach a vulnerable code path.
- If exploitation is plausible, isolate affected services and follow your RCE incident response process.
