Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:SQL:INJ:MULTI-VENDORS-1

Severity

Minor

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Multiple Vendors SQL Injection Detected (1)

Release Date

2015/03/16

Update Number

2475

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Multiple Vendors SQL Injection Detected (1)


This signature detects specific characters, typically used in SQL procedures, within an HTTP connection. Because these characters are not normally used in HTTP, this can indicate a SQL injection attack through a procedure. However, it can be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.

Extended Description

Multiple SQL injection vulnerabilities in the (1) update_whosonline_reg and (2) update_whosonline_guest functions in Elite Bulletin Board before 2.1.22 allow remote attackers to execute arbitrary SQL commands via the PATH_INFO to (a) checkuser.php, (b) groups.php, (c) index.php, (d) login.php, (e) quicklogin.php, (f) register.php, (g) Search.php, (h) viewboard.php, or (i) viewtopic.php.

Affected Products

  • Elite-board elite_bulletin_board 2.0.0
  • Elite-board elite_bulletin_board 2.0.1
  • Elite-board elite_bulletin_board 2.0.2
  • Elite-board elite_bulletin_board 2.0.3
  • Elite-board elite_bulletin_board 2.1.0
  • Elite-board elite_bulletin_board 2.1.1
  • Elite-board elite_bulletin_board 2.1.10
  • Elite-board elite_bulletin_board 2.1.11
  • Elite-board elite_bulletin_board 2.1.12
  • Elite-board elite_bulletin_board 2.1.13
  • Elite-board elite_bulletin_board 2.1.14
  • Elite-board elite_bulletin_board 2.1.15
  • Elite-board elite_bulletin_board 2.1.16
  • Elite-board elite_bulletin_board 2.1.17
  • Elite-board elite_bulletin_board 2.1.18
  • Elite-board elite_bulletin_board 2.1.19
  • Elite-board elite_bulletin_board 2.1.2
  • Elite-board elite_bulletin_board 2.1.20
  • Elite-board elite_bulletin_board 2.1.21
  • Elite-board elite_bulletin_board 2.1.3
  • Elite-board elite_bulletin_board 2.1.4
  • Elite-board elite_bulletin_board 2.1.5
  • Elite-board elite_bulletin_board 2.1.6
  • Elite-board elite_bulletin_board 2.1.7
  • Elite-board elite_bulletin_board 2.1.8
  • Elite-board elite_bulletin_board 2.1.9

References

  • CVE: CVE-2012-5874
  • CVE: CVE-2012-6560

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out