HTTP: SQL Command in URL

This signature detects a SQL command in a URL. Because SQL commands are not normally used in HTTP connections, this can indicate a SQL injection attack. This can also be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

Netscape's iPlanet iCal application is a network based calendar service built for deployment in organizations which require a centralized calendar system. Certain versions of iCal ship with a vulnerability introduced in the installation process which will allow malicious local users to gain root on the system. During the installation process a large number of files are left world readable and writable. One such file, /opt/SUNWicsrv/cal/bin/iplncal.sh is designed to be run at startup as root and is world writable by default. This allows users to modify the contents of this startup script and have it executed at boot up time or whenever the machine is re-initialized.

Affected Products

Netscape ical

Short Name
HTTP:SQL:INJ:CMD-IN-URL
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2000-0402 CVE-2010-4365 CVE-2011-4340 CVE-2014-1651 CVE-2014-2587 CVE-2014-9173 CVE-2015-4870 CVE-2015-7297 CVE-2015-7857 CVE-2015-7858 CVE-2016-4350 CVE-2016-82014 CVE-2016-8580 CVE-2017-14078 CVE-2017-7973 CVE-2018-17243 CVE-2018-3602 CVE-2018-3604 CVE-2018-3606 Command SQL URL bid:100966 bid:1768 bid:22593 bid:45050 bid:66302 bid:67754 bid:77208 bid:93864 in
Release Date
05/26/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3795
False Positive
Rarely
Vendors

Netscape

CVSS Score

3.5

6.5

4.0

7.5

10.0

5.8

2.1

Found a potential security threat?