Short Name |
HTTP:SQL:INJ:CHAR-ENCODE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
SQL Character Encoding Evasion in URL |
Release Date |
2010/04/23 |
Update Number |
1665 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects SQL commands with character conversion within a URL. The char() function converts hexadecimal and decimal values into characters to be interpreted by the SQL engine. By encoding common injection variables, attackers can attempt to evade detection. Because SQL commands are not normally used in HTTP connections, this can indicate a SQL injection attack. However, it can be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.
By manipulating SQL queries in the URL, a malicious user is able to guide the execution flow of a SQL server to cause unexpected operations in the SQL backend. This results in data leaks, or false authentications.