Files
blue-team-tools/rules/application/sql/app_sqlinjection_errors.yml
T

32 lines
1.0 KiB
YAML
Raw Normal View History

2017-11-27 22:52:17 +01:00
title: Suspicious SQL Error Messages
2019-11-12 23:12:27 +01:00
id: 8a670c6d-7189-4b1c-8017-a417ca84a086
2021-11-27 11:33:14 +01:00
status: test
2017-11-27 22:52:17 +01:00
description: Detects SQL error messages that indicate probing for an injection attack
references:
2022-10-25 06:48:55 +02:00
- http://www.sqlinjection.net/errors
author: Bjoern Kimminich
2021-11-27 11:33:14 +01:00
date: 2017/11/27
modified: 2023/02/12
2022-10-25 06:48:55 +02:00
tags:
- attack.initial_access
- attack.t1190
2017-11-27 22:52:17 +01:00
logsource:
2022-10-25 06:48:55 +02:00
category: application
product: sql
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL ERROR and above)'
2017-11-27 22:52:17 +01:00
detection:
2022-10-25 06:48:55 +02:00
keywords:
2017-11-27 22:52:17 +01:00
# Oracle
2022-10-25 06:48:55 +02:00
- quoted string not properly terminated
2017-11-27 22:52:17 +01:00
# MySQL
2022-10-25 06:48:55 +02:00
- You have an error in your SQL syntax
2017-11-27 22:52:17 +01:00
# SQL Server
2022-10-25 06:48:55 +02:00
- Unclosed quotation mark
2017-11-27 22:52:17 +01:00
# SQLite
2022-10-25 06:48:55 +02:00
- 'near "*": syntax error'
- SELECTs to the left and right of UNION do not have the same number of result columns
condition: keywords
2017-11-27 22:52:17 +01:00
falsepositives:
- A syntax error in MySQL also occurs in non-dynamic (safe) queries if there is an empty in() clause, that may often be the case.
2017-11-27 22:52:17 +01:00
level: high