Short Name |
HTTP:SQL:INJ:MYSQL-TABLE-NAME |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
MySQL Table Name in URL Variable |
Release Date |
2012/07/11 |
Update Number |
2160 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects MySQL table names being sent in HTTP URL variables. Such activity could be an SQL Command Injection attempt. It could also detect non-malicious references to MySQL table names, such as in a blog posting, or for websites that use SQL commands in their URL's as a part of that website's normal functionality (not recommended).
SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors.