Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:SQL:INJ:AUTHID

Severity

Medium

Recommended

No

Category

HTTP

Keywords

Oracle SQL Injection

Release Date

2005/03/02

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: SQL AUTHID Keyword SQL Injection


This signature detects attempts to run SQL queries with high privileges. The AUTHID CURRENT_USER keyword can be used to run queries with privileges of the owner. It can also be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

Injection of the AUTHID CURRENT_USER SQL directive by an attacker may escalate privilege levels and allow an attacker access to database objects that would otherwise be inaccessible under the definer rights model.

References

  • URL: http://security-papers.globint.com.ar/oracle_security/sql_injection_in_oracle.php

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out