Rule Category

SQL -- Snort has detected traffic associated with SQL injection or the presence of other vulnerabilities against SQL like servers.

Alert Message

SQL generic sql with comments injection attempt - GET parameter

Rule Explanation

This event is generated when an attempt is made to exploit an SQL injection vulnerability in an application. Impact: Information gathering and system integrity compromise. Possible unauthorized administrative access to the server or application. Possible execution of arbitrary code of the attackers choosing in some cases. Details: This event indicates that an attempt has been made to inject SQL code from a remote machine via the "with comments" command. If stringent input checks are not performed by the CGI application, it may also be possible for an attacker to compromise the database backend for the application, the attacker may also be able to execute system binaries or malicious code of their choosing. This event is generated when an attempt is made to gain unauthorized access to a CGI application running ona web server. Some applications do not perform stringent checks when validating the credentials of a client host connecting to the services offered on a host server. This can lead to unauthorized access and possibly escalated privileges to that of the administrator. Data stored on the machine can be compromised and trust relationships between the victim server and other hosts can be exploited by the attacker. Ease of Attack: Simple. Exploits exist.

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

CVE Additional Information