Potential XXE Exploitation Attempt In JVM Based Application

Detects XML parsing issues, if the application expects to work with XML make sure that the parser is initialized safely.

Sigma rule (View on GitHub)

 1title: Potential XXE Exploitation Attempt In JVM Based Application
 2id: c4e06896-e27c-4583-95ac-91ce2279345d
 3status: test
 4description: Detects XML parsing issues, if the application expects to work with XML make sure that the parser is initialized safely.
 5references:
 6    - https://rules.sonarsource.com/java/RSPEC-2755
 7    - https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
 8    - https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
 9author: Moti Harmats
10date: 2023/02/11
11tags:
12    - attack.initial_access
13    - attack.t1190
14logsource:
15    category: application
16    product: jvm
17    definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
18detection:
19    keywords:
20        - 'SAXParseException'
21        - 'DOMException'
22    condition: keywords
23falsepositives:
24    - If the application expects to work with XML there may be parsing issues that don't necessarily mean XXE.
25level: high

References

Related rules

to-top