Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:SQL:INJ:GENERIC

Severity

Minor

Recommended

No

Category

HTTP

Keywords

Generic SQL Injection Detection

Release Date

2004/05/26

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Generic SQL Injection Detection


This signature detects specific characters, typically used in SQL, within an HTTP connection. Because these characters are not normally used in HTTP, this can indicate a SQL or command injection attack. However, it can be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet. Some attempts at Cross Site Scripting attacks also trigger this signature.

Extended Description

inTouch is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Affected Products

  • Intouch intouch 0.5.1 Alpha

References

  • BugTraq: 93864
  • BugTraq: 39489
  • BugTraq: 60816
  • BugTraq: 7804
  • BugTraq: 70595
  • BugTraq: 17040
  • BugTraq: 16110
  • CVE: CVE-2006-0088
  • CVE: CVE-2014-3704
  • CVE: CVE-2012-6584
  • CVE: CVE-2015-2216
  • CVE: CVE-2010-4635
  • CVE: CVE-2012-2740
  • CVE: CVE-2012-5098
  • CVE: CVE-2015-5148
  • CVE: CVE-2010-4143
  • CVE: CVE-2010-1090
  • CVE: CVE-2010-1091
  • CVE: CVE-2010-1661
  • CVE: CVE-2010-1662
  • CVE: CVE-2010-2699
  • CVE: CVE-2010-2700
  • CVE: CVE-2010-2714
  • CVE: CVE-2010-2715
  • CVE: CVE-2010-3481
  • CVE: CVE-2010-0764
  • CVE: CVE-2010-1073
  • CVE: CVE-2010-4480
  • CVE: CVE-2013-7349
  • CVE: CVE-2013-5311
  • CVE: CVE-2014-10035
  • CVE: CVE-2014-9347
  • CVE: CVE-2012-3183
  • CVE: CVE-2012-3184
  • CVE: CVE-2014-2586
  • CVE: CVE-2012-1670
  • CVE: CVE-2012-2925
  • CVE: CVE-2012-4258
  • CVE: CVE-2012-4262
  • CVE: CVE-2010-5023
  • CVE: CVE-2011-4801
  • CVE: CVE-2010-5003
  • CVE: CVE-2012-1911
  • CVE: CVE-2012-1777
  • CVE: CVE-2018-19127
  • CVE: CVE-2012-1495
  • CVE: CVE-2014-7864
  • CVE: CVE-2015-6058
  • CVE: CVE-2011-0267
  • CVE: CVE-2010-0432
  • CVE: CVE-2016-8580
  • CVE: CVE-2009-4596
  • CVE: CVE-2016-4350
  • CVE: CVE-2013-3502
  • CVE: CVE-2016-10174
  • CVE: CVE-2006-1148
  • CVE: CVE-2012-4869
  • URL: https://github.com/danielmiessler/SecLists/tree/master/Payloads
  • URL: https://www.drupal.org/SA-CORE-2014-005
  • URL: http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html
  • URL: http://0day.today/exploit/19259
  • URL: http://insecurety.net/?p=144
  • URL: http://www.symantec.com/connect/blogs/ddos-attacks-zemra-bot
  • URL: https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-nvr-vulns.txt
  • URL: http://seclists.org/bugtraq/2016/Aug/45
  • URL: https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear-wnr2000.txt
  • URL: http://seclists.org/fulldisclosure/2016/Dec/72
  • URL: http://kb.netgear.com/000036549/Insecure-Remote-Access-and-Command-Execution-Security-Vulnerability
  • URL: http://seclists.org/fulldisclosure/2017/Jan/40
  • URL: https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt
  • URL: http://www.zerodayinitiative.com/advisories/zdi-15-235/
  • URL: https://blogs.securiteam.com/index.php/archives/2910
  • URL: https://www.manageengine.com/products/applications_manager/service-packs.html
  • URL: http://www.securityfocus.com/infocus/1768
  • URL: http://webstersprodigy.net/2012/10/25/cve-2012-5357cve-1012-5358-cool-ektron-xslt-rce-bugs/
  • URL: http://technet.microsoft.com/en-us/security/msvr/msvr12-016
  • URL: https://www.drupal.org/sa-core-2014-005
  • URL: http://resources.infosecinstitute.com/checking-out-backdoor-shells/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out