Potential SpEL Injection In Spring Framework
Detects potential SpEL Injection exploitation, which may lead to RCE.
Sigma rule (View on GitHub)
1title: Potential SpEL Injection In Spring Framework
2id: e9edd087-89d8-48c9-b0b4-5b9bb10896b8
3status: test
4description: Detects potential SpEL Injection exploitation, which may lead to RCE.
5references:
6 - https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection
7 - https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
8author: Moti Harmats
9date: 2023-02-11
10tags:
11 - attack.initial-access
12 - attack.t1190
13logsource:
14 category: application
15 product: spring
16 definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
17detection:
18 keywords:
19 - 'org.springframework.expression.ExpressionException'
20 condition: keywords
21falsepositives:
22 - Application bugs
23level: high
References
Related rules
- ADSelfService Exploitation
- Apache Spark Shell Command Injection - ProcessCreation
- Apache Spark Shell Command Injection - Weblogs
- Apache Threading Error
- Arcadyan Router Exploitations