Description |
This article describes how to use custom rules in FortiSIEM to raise alerts for incident response related to attacks that attempt to leverage the Spring Cloud Gateway Actuator Endpoint Remote Code Execution vulnerability. Reports are also included to analyze past logs for transpired attacks. |
Scope |
These Rules and Reports help to detect attempts to send specially crafted HTTP requests to vulnerable Spring Cloud Gateway Actuators in order to gain control of vulnerable systems, based on logs from FortiGates, FortiClients, and FortiSandbox. |
Solution |
Due to a flaw in the Actuator endpoint of Spring Cloud Gateway, when a user enables and exposes an insecure Gateway Actuator endpoint, Applications using Spring Cloud Gateway are vulnerable to code injection attacks.
Unauthenticated attackers can achieve remote code execution by sending specially crafted SpEL expressions to the target system for injection.
What is included in Fortinet_FortiSIEM_Sysrv-K_Botnet.zip?
- A FortiSIEM Rule to help with detection.
1) Use Fortinet_FortiSIEM_Sysrv-K_Botnet_Reports_v1.xml as the file to import the Reports.
- Navigate to Resource / Reports.
2) Use Fortinet_FortiSIEM_Sysrv-K_Botnet_Rules_v1.xml as the file to import the Rules.
- Select Fortinet_FortiSIEM_Sysrv-K_Botnet_Rules_v1.xml and import. - Select the Import. - Select Fortinet_FortiSIEM_Sysrv-K_Botnet_Rules_v1.xml and import.
FortiSIEM version 6.4.0 https://help.fortinet.com/fsiem/6-4-0/Online-Help/HTML5_Help/content_updates.htm#Content7 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.