For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/def-000-ssp.md. A documentation index is available at /llms.txt.

HTTP requests containing Java/Spring RCE exploitation patterns

Goal

Detect HTTP requests whose URL, query string, or headers contain Java or Spring-related remote code execution patterns.

Strategy

This rule monitors OCSF HTTP fields for payloads referencing runtime execution, class loaders, or Spring Cloud Function routing constructs, grouped by @ocsf.src_endpoint.ip.

Triage and response

  • Validate whether the application stack is Java or Spring and whether the payloads could reach a vulnerable code path.
  • If exploitation is plausible, isolate affected services and follow your RCE incident response process.