HTTP: SQL 'exec master' Command Injection in URL

This signature detects attempts to perform an SQL injection attack against a web server. Some web applications may be vulnerable. A successful attack could result in a complete data compromise of the targeted website. However, it can be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Short Name
HTTP:SQL:INJ:EXEC-MASTER
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
'exec Command Injection SQL URL in master'
Release Date
04/02/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown

Found a potential security threat?