Short Name |
HTTP:SQL:INJ:AUTHID |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
SQL AUTHID Keyword SQL Injection |
Release Date |
2005/03/02 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to run SQL queries with high privileges. The AUTHID CURRENT_USER keyword can be used to run queries with privileges of the owner. It can also be a false positive. To reduce False Positives, it is strongly recommended that these signatures only be used to inspect traffic from the Internet to your organization's web servers that use SQL backend databases to generate content and not to inspect traffic going from your organization to the Internet.
Injection of the AUTHID CURRENT_USER SQL directive by an attacker may escalate privilege levels and allow an attacker access to database objects that would otherwise be inaccessible under the definer rights model.