Short Name |
HTTP:SQL:INJ:IS_SRVROLEMEMBER |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
IS_SRVROLEMEMBER/IS_MEMBER MS-SQL Injection |
Release Date |
2009/03/20 |
Update Number |
1389 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects SQL commands within a URL. Because SQL commands are not normally used in HTTP connections, this can indicate a SQL injection attack. However, it can be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet. This particular technique uses the IS_SRVROLEMEMBER or IS_MEMBER MS-SQL keywords in combination with an SQL escape sequence (;--). A successful attack could modify or destroy data in a database, including granting administrative privileges to the database. This technique is currently being used by botnets to attack financial institutions worldwide.