HTTP: SQL 'insert..values' Command Injection in URL

This signature detects attempts to perform an SQL injection attack against a web server. Some web applications may be vulnerable. A successful attack could result in a complete data compromise of the targeted website. However, it can be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

Multiple SQL injection vulnerabilities in Novell ZENworks Patch Management 6.x before 6.2.2.181 allow remote attackers to execute arbitrary SQL commands via the (1) Direction parameter to computers/default.asp, and the (2) SearchText, (3) StatusFilter, and (4) computerFilter parameters to reports/default.asp.

Affected Products

Novell zenworks_patch_management_server

Short Name
HTTP:SQL:INJ:INSERT-VALUES
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
'insert..values' CVE-2005-3315 Command Injection SQL URL bid:15220 in
Release Date
04/02/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Novell

CVSS Score

7.5

Found a potential security threat?