Short Name |
HTTP:SQL:INJ:PL-SQL |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
PL/SQL Command in URL |
Release Date |
2005/03/02 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects a PL/SQL block in the URL. This can indicate a SQL injection attack on a database such as Oracle. It can also be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.
The presence of Oracle stored procedure keywords in client-to-server HTTP traffic could indicate a SQL injection attack is being attempted.