HTTP: SQL Command Chain in URL Detection (1)

This signature detects a SQL command sequence in a URL. Because SQL commands are not normally used in HTTP connections, this can indicate a SQL injection attack. However, it might also be a false positive - many Web sites use variables similar in format to SQL, and some Web sites even use SQL as part of normal operations. This is considered a poor convention, as sites using raw SQL in variables can be vulnerable to SQL injection. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

By manipulating SQL queries in the URL, a malicious user is able to guide the execution flow of a SQL server to cause unexpected operations in the SQL backend. This results in data leaks, or false authentications.

References

BugTraq: 22593 1768

Short Name
HTTP:SQL:INJ:CMD-CHAIN-1
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
(1) Chain Command Detection SQL URL bid:1768 bid:22593 in
Release Date
05/26/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Occasionally

Found a potential security threat?