HTTP: SQL Injection Detected on HTTP Request Variable 1
This signature detects specific characters, typically used in SQL procedures, within an HTTP connection. Because these characters are not normally used in HTTP, this can indicate a SQL injection attack through a procedure. However, it can be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.
Extended Description
Multiple SQL injection vulnerabilities in MYRE Vacation Rental Software allow remote attackers to execute arbitrary SQL commands via the (1) garage1 or (2) bathrooms1 parameter to vacation/1_mobile/search.php, or (3) unspecified input to vacation/widgate/request_more_information.php.
Affected Products
Myrephp myre_vacation_rental
References
CVE: CVE-2015-2562
URL: http://pandorafms.com/downloads/whats_new_5-SP3.pdf http://blog.pandorafms.org/?p=2041 https://pentest.blog/advisory-cryptolog-unauthenticated-remote-code-execution/ http://www.openwall.com/lists/oss-security/2013/10/23/10 http://adamcaudill.com/2013/10/23/vicidial-multiple-vulnerabilities/
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Myrephp
7.5
6.5
10.0
5.0