heroui logo

Web Spring4Shell HTTP Request Class Module

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect attempts to exploit the Spring4Shell vulnerability (CVE-2022-22965) in HTTP requests. By analyzing HTTP payloads through the Splunk Stream integration, it targets specific patterns in the request body, particularly focusing on the presence of fields related to potential exploits in the Spring Framework. The exploitation attempt is indicated by the inclusion of terms such as 'class.module.classLoader.resources.context.parent.pipeline.first' and file types like '.jsp', both of which are associated with the vulnerability. When confirmed malicious, such actions can lead to serious security breaches, including unauthorized access and execution of arbitrary code. The rule provides operators with the ability to monitor and act on these critical events, potentially preventing exploitation. It is advised to limit the analytic's scope to reduce false positives, as legitimate traffic may sometimes be misinterpreted as malicious.
Categories
  • Web
Data Sources
  • Pod
  • Container
  • Web Credential
ATT&CK Techniques
  • T1190
  • T1133
Created: 2024-11-15