HTTP: MS-SQL Function in URL Variable

This signature detects Microsoft SQL functions being sent in HTTP URL variables. Such activity could be an SQL Command Injection attempt. It could also detect non-malicious references to Microsoft SQL functions, such as in a blog posting, or for websites that use SQL commands in their URL's as a part of that website's normal functionality (not recommended).

Short Name
HTTP:SQL:INJ:MS-SQL-FUNCTIONS
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Function MS-SQL URL Variable in
Release Date
07/12/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown

Found a potential security threat?