Forum Discussion
imac_105647
Nimbostratus
Jul 08, 2010Attack signature not triggered
Hello,
We had a visit from an attacker last night and ASM did not trigger on this URI:
/content/job-details.php?id=-49893%20UNION%20SELECT%20CHAR(97,102,56,56,48,48,55,53,97,97)--1040
I see there is a UNION SELECT SQL Injection attack signature that seems to be active for the policy in place for this website, but the attack did not trigger it.
Any idea why that might be the case?
Incidentally we also run mod_security and that blocked the attack.
Thanks, Ian
7 Replies
Sort By
- hoolio
Cirrostratus
Hi Ian, - imac_105647
Nimbostratus
Hi Aaron, - hoolio
Cirrostratus
Sorry, that would only have worked if you were logging all requests. You could also append a query string parameter with a ' or some other metacharacter that is marked as illegal to trigger a violation. - imac_105647
Nimbostratus
Odder and odder, - imac_105647
Nimbostratus
I think it is something to do with staging the policy is new and the signatures are show as "In staging since 08/07/2010" does this affect what they do? - hoolio
Cirrostratus
Staging allows you to make changes to the policy (generally tightening it) and put the changes in transparent mode. If you have staging enabled (under Policy | Staging-Tightening Period) and update the attack sigs, modified and new signatures will be put in staging until you manually enable them. - imac_105647
Nimbostratus
Yes that is what it was, I've turned staging off and re-ran the query and the ASM alerts. Thanks for your help, sorry to bother you,
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects