HTTP: SQL Command In Header Fields (3)

This signature detects a long SQL command sequence in a HTTP request header. Because SQL commands are not normally used in HTTP connections, this can indicate a SQL injection attack. It could, however, be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet. Attackers can inject SQL commands using some header fields.

Short Name
HTTP:SQL:INJ:HEADER-3
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
(3) Command Fields Header In SQL
Release Date
07/08/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Occasionally

Found a potential security threat?