Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:SQL:INJ:INTO-OUTFILE

Severity

Minor

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

INTO OUTFILE/DUMPFILE Command Injection

Release Date

2012/07/11

Update Number

2160

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: INTO OUTFILE/DUMPFILE Command Injection


This signature detects attempts to perform SQL Injection. Dynamic web pages that accept user input without proper variable validation are vulnerable to arbitrary command injection.

Extended Description

A vulnerability exists in gauge.php of AlienVault OSSIM and USM before 5.3.2 that allows an attacker to execute an arbitrary SQL query and retrieve database information or read local system files via MySQL's LOAD_FILE.

Affected Products

  • Alienvault open_source_security_information_and_event_management 5.3.1
  • Alienvault unified_security_management 5.3.1

References

  • CVE: CVE-2016-8582
  • URL: http://en.wikipedia.org/wiki/SQL_injection

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out