
Summary
This rule is designed to detect suspicious exceptions arising from the Spring Framework, an application framework widely used for building enterprise-level applications in Java. The rule specifically targets identifiers of known exceptions that may indicate potential exploitation attempts, which may be a precursor to security breaches or attacks on web applications built using this framework. Detected exceptions include common security vulnerabilities such as Access Denied errors, CSRF (Cross-Site Request Forgery) related exceptions, and cookie theft vulnerabilities. By monitoring these exceptions, organizations can take preemptive action against exploitation.
Categories
- Application
- Web
- Network
Data Sources
- Application Log
Created: 2017-08-06