Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:SQL:INJ:CMD-CHAIN-2

Severity

Medium

Recommended

No

Category

HTTP

Keywords

SQL Command Chain in URL Detection (2)

Release Date

2004/05/26

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: SQL Command Chain in URL Detection (2)


This signature detects a long SQL command sequence in a URL. Because SQL commands are not normally used in HTTP connections, this can indicate a SQL injection attack. This can also be a false positive. To reduce false positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's Web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

By manipulating SQL queries in the URL, a malicious user is able to guide the execution flow of a SQL server to cause unexpected operations in the SQL backend. This results in data leaks, or false authentications.

References

  • BugTraq: 66302
  • CVE: CVE-2014-2587
  • URL: http://www.securityfocus.com/infocus/1768

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out