
Summary
This detection rule identifies when a Java user agent makes a GET request for a .class file from a remote server, utilizing web or proxy logs analyzed through the Web Datamodel in a system like Splunk. The detection is critical as it can signal potential exploitation attempts, particularly those relating to the Log4Shell vulnerability (CVE-2021-44228). Attackers leveraging this method could exploit weaknesses in Java applications leading to remote code execution, which could significantly compromise the system. The integration with Splunk Stream HTTP for data ingestion is essential for accurate detection of this behavior, making use of specific searching criteria tailored to highlight these risky requests based on the user agent, method, and file type accessed.
Categories
- Web
- Endpoint
- Cloud
- Application
- Network
Data Sources
- Web Credential
- Application Log
- Network Traffic
ATT&CK Techniques
- T1190
Created: 2024-11-15