Potential XXE Exploitation Attempt In JVM Based Application
Detects XML parsing issues, if the application expects to work with XML make sure that the parser is initialized safely.
Sigma rule (View on GitHub)
1title: Potential XXE Exploitation Attempt In JVM Based Application
2id: c4e06896-e27c-4583-95ac-91ce2279345d
3status: test
4description: Detects XML parsing issues, if the application expects to work with XML make sure that the parser is initialized safely.
5references:
6 - https://rules.sonarsource.com/java/RSPEC-2755
7 - https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
8 - https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
9author: Moti Harmats
10date: 2023-02-11
11tags:
12 - attack.initial-access
13 - attack.t1190
14logsource:
15 category: application
16 product: jvm
17 definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
18detection:
19 keywords:
20 - 'SAXParseException'
21 - 'DOMException'
22 condition: keywords
23falsepositives:
24 - If the application expects to work with XML there may be parsing issues that don't necessarily mean XXE.
25level: high
References
Related rules
- ADSelfService Exploitation
- Apache Spark Shell Command Injection - ProcessCreation
- Apache Spark Shell Command Injection - Weblogs
- Apache Threading Error
- Arcadyan Router Exploitations