LoFP LoFP / false positives may occur and filtering may be required. restrict analytic to asset type.

Techniques

Sample rules

Web Spring4Shell HTTP Request Class Module

Description

The following analytic identifies the payload related to Spring4Shell, CVE-2022-22965. This analytic uses Splunk Stream HTTP to view the http request body, form data. STRT reviewed all the current proof of concept code and determined the commonality with the payloads being passed used the same fields “class.module.classLoader.resources.context.parent.pipeline.first”.

Detection logic

`stream_http` http_method IN ("POST") 
| stats values(form_data) as http_request_body min(_time) as firstTime max(_time) as lastTime count by src dest http_method http_user_agent uri_path url bytes_in bytes_out 
| search http_request_body IN ("*class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat=_*", "*class.module.classLoader.resources.context.parent.pipeline.first.pattern*","*suffix=.jsp*") 
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `web_spring4shell_http_request_class_module_filter`