HTTP: PL/SQL Command in URL

This signature detects a PL/SQL block in the URL. This can indicate a SQL injection attack on a database such as Oracle. It can also be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

The presence of Oracle stored procedure keywords in client-to-server HTTP traffic could indicate a SQL injection attack is being attempted.

Short Name
HTTP:SQL:INJ:PL-SQL
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Command PL/SQL URL in
Release Date
03/03/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown

Found a potential security threat?