HTTP: SQL Injection in HTTP Cookie

This signature detects attempts to exploit a known vulnerability against multiple Web applications. It could, however, be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet. Attackers can inject SQL command using cookie header fields.

Extended Description

SQL injection vulnerability in Watchguard XCS 9.2 and 10.0 before build 150522 allows remote attackers to execute arbitrary SQL commands via the sid cookie, as demonstrated by a request to borderpost/imp/compose.php3.

Affected Products

Watchguard xcs

References

BugTraq: 75516

CVE: CVE-2015-5452

Short Name
HTTP:SQL:INJ:HEADER-COOKIE
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2015-5452 Cookie HTTP Injection SQL bid:75516 in
Release Date
03/31/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Occasionally
Vendors

Watchguard

CVSS Score

7.5

Found a potential security threat?