
Summary
This rule is designed to identify potentially malicious activity within Java Virtual Machine (JVM) based applications by monitoring application error logs for specific exceptions related to process execution failures. Such failures might indicate an attempted Remote Code Execution (RCE) exploit, where an attacker tries to execute arbitrary code by exploiting vulnerabilities in the application. It utilizes keywords that are commonly present in error messages associated with process execution problems, specifically targeting exceptions like 'Cannot run program', and references to Java's ProcessImpl and ProcessBuilder classes. The rule requires error-level logging (LOG_LEVEL=ERROR and above) to be enabled for accurate detection and analysis. High severity is assigned due to the potential implications of successful RCE attempts, which could allow an attacker to gain unauthorized access or control over the affected systems. To mitigate false positives, care should be taken to distinguish legitimate application bugs from potential exploit attempts.
Categories
- Application
- Infrastructure
Data Sources
- Application Log
Created: 2023-02-11