Description | This article describes how to use a custom event handler in FortiSIEM to raise incidents related to attacks that attempt to leverage the Spring4Shell Vulnerability. |
Scope | The FortiSIEM Rules and Reports helps to detect attempts to send specially crafted HTTP requests to vulnerable Spring Core systems in order to inject custom Tag Library Descriptors (TLD) files when compiling JSP files based on logs from FortiGates, FortiADC, and FortiProxy. |
Solution |
When compiling JSP files in Spring Beans, a class loader (modified by the attacker) will return URLs to resolve TLD files.
TLD files support tag files which are essentially plaintext file containing Java code. By controlling this URL, the attacker can supply their own TLD/tag file which may contain arbitrary code.
For more information about this attack, see the following FortiGuard Outbreak Alert: FortiGuard Outbreak Alert: Spring4Shell Vulnerability.
- A FortiSIEM Rule to help with detection.
4) Use Fortinet_FortiSIEM_Spring4Shell_Rules_v1.xml as the file to import the Rules.
- Select Fortinet_FortiSIEM_Spring4Shell_Rules_v1.xml and import.
https://help.fortinet.com/fsiem/6-4-0/Online-Help/HTML5_Help/content_updates.htm |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.