Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:SQL:INJ:PL-SQL

Severity

Medium

Recommended

Yes

Category

HTTP

Keywords

Oracle

Release Date

2005/03/02

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: PL/SQL Command in URL


This signature detects a PL/SQL block in the URL. This can indicate a SQL injection attack on a database such as Oracle. It can also be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

The presence of Oracle stored procedure keywords in client-to-server HTTP traffic could indicate a SQL injection attack is being attempted.

References

  • URL: http://security-papers.globint.com.ar/oracle_security/sql_injection_in_oracle.php

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out