For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/def-000-pvl.md. A documentation index is available at /llms.txt.

HTTP requests containing Log4Shell JNDI injection patterns

Goal

Detect HTTP requests containing Log4Shell-style JNDI lookup strings in the query string, path, headers, or user agent.

Strategy

This rule monitors OCSF HTTP activity for JNDI injection patterns across multiple request attributes, grouped by @ocsf.src_endpoint.ip.

Triage and response

  • Confirm whether affected systems run vulnerable Log4j versions and whether lookups could have been evaluated.
  • Apply vendor patches or mitigations for affected production assets.