<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Generic SQL Injection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043435#M79175</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm also confused why the regex looks for the encoded value of '+' (\x2b), but not the encoded value of '='.  It works either way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"+and+1%3D1"  &amp;lt;-- fires&lt;/P&gt;&lt;P&gt;"+and+1=1" &amp;lt;--fires&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I change the regex to:&lt;/P&gt;&lt;P&gt;(%20|[+])[aA][nN][dD](%20|[+])1=[12] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It fires on either the literal '+' or the encoded version:&lt;/P&gt;&lt;P&gt;"%2Band%2B1%3D1"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Aug 2008 14:08:32 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2008-08-08T14:08:32Z</dc:date>
    <item>
      <title>Generic SQL Injection</title>
      <link>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043433#M79172</link>
      <description>&lt;P&gt;Hi, regarding IDS signature 5930. This appears to be an old signature re-released with the recent asproxy vulnerabilities in mind. We have seen this fire with subsig 5 (asprox) and subsig 4 which detects " AND 1=1" in HTTP arguments. However when we look at the captures for subsig 4 alerts we are unable to find this argument in the capture anywhere (TAC currently raised).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, what is the best method of protecting against these vulnerablities - is it just a case of te developers ensuring that the code is not vulnerable? There is an MS test tool available to help with this &lt;A class="jive-link-custom" href="http://support.microsoft.com/kb/954476" target="_blank"&gt;http://support.microsoft.com/kb/954476&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have any similar thoughts on this and the best way to defned against this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:14:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043433#M79172</guid>
      <dc:creator>andrew.bagley</dc:creator>
      <dc:date>2019-03-10T11:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: Generic SQL Injection</title>
      <link>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043434#M79173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;subsig 5 is probably legit (e.g. asprox, something trying to inject SQL).  I'm quite surprised you've actually seen subsig 4 fire. I don't get why an attacker would use "AND 1=1" because it would evaluate to false.  "OR 1=1" is the more classical example makes more sense because if it works it will evaluate to true.  The regex is pretty basic though:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(%20|\x2b)[aA][nN][dD](%20|\x2b)1=[12]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, it won't match unless it sees " and 1=1" or " and 1=2".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do you have just the contextual data, or do you have the trigger packet and/or log packets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're inline, you could use a drop action.  If promiscuous, you might be able to use TCP resets.  The real fix is to use a "white list" approach to filter input in your web applications.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Aug 2008 13:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043434#M79173</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-08-08T13:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Generic SQL Injection</title>
      <link>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043435#M79175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm also confused why the regex looks for the encoded value of '+' (\x2b), but not the encoded value of '='.  It works either way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"+and+1%3D1"  &amp;lt;-- fires&lt;/P&gt;&lt;P&gt;"+and+1=1" &amp;lt;--fires&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I change the regex to:&lt;/P&gt;&lt;P&gt;(%20|[+])[aA][nN][dD](%20|[+])1=[12] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It fires on either the literal '+' or the encoded version:&lt;/P&gt;&lt;P&gt;"%2Band%2B1%3D1"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Aug 2008 14:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/generic-sql-injection/m-p/1043435#M79175</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-08-08T14:08:32Z</dc:date>
    </item>
  </channel>
</rss>

