
Summary
This detection rule is designed to identify potential exploitation attempts related to JNDI (Java Naming and Directory Interface) injection in Java Virtual Machine (JVM) based applications. The rule specifically targets indicators that may suggest an attempt to exploit vulnerabilities such as Log4Shell, which arises from unsafe handling of JNDI lookups that may be manipulated by attackers. Unauthorized modifications or attempts to access resources via JNDI can lead to Remote Code Execution (RCE) if the application is improperly secured. The keywords associated with this rule, like 'com.sun.jndi.ldap.' and 'org.apache.logging.log4j.core.net.JndiManager', help in pinpointing relevant patterns in application error logs that indicate exploitation attempts. As such, the rule necessitates the collection of application error logs filtered to the ERROR log level or higher, ensuring that relevant exploitation activities can be captured effectively.
Categories
- Application
Data Sources
- Application Log
Created: 2023-02-11