HTTP: SQL Injection Detected on HTTP Request Variable 5

This signature detects specific characters, typically used in SQL procedures, within an HTTP connection. Because these characters are not normally used in HTTP, this can indicate a SQL injection attack through a procedure. However, it can be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

operation/agentes/networkmap.php in Pandora FMS before 3.1.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the layout parameter in an operation/agentes/networkmap action to index.php.

Affected Products

Artica pandora_fms

Short Name
HTTP:SQL:INJ:REQ-VAR-5
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
5 CVE-2010-4278 CVE-2010-4959 CVE-2011-0644 CVE-2011-503 CVE-2011-5031 CVE-2015-2065 CVE-2015-6522 CVE-2016-2555 CVE-2017-6526 CVE-2018-10562 CVE-2018-5974 CVE-2020-12641 Detected HTTP Injection Request SQL Variable bid:57958 on
Release Date
09/15/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3610
False Positive
Frequently
Vendors

Artica

CVSS Score

7.5

9.0

10.0

Found a potential security threat?