For more information regarding the security incident at F5, the actions we are taking to address it, and our ongoing efforts to protect our customers, click here.

Forum Discussion

NoamRotter's avatar
NoamRotter
Icon for Altostratus rankAltostratus
Dec 31, 2019

How to block Time-Based Blind SQL Injection Attacks

I have a web app and a PT was successful to perform this attack:

https://mywebsite/Login.aspx?test=;waitfor delay '0:0:__TIME__'—

The VS has ASM profile with server technologies:

  • IIS
  • MSSQL
  • ASP.NET
  • Microsoft Windows

The policy is in blocking mode

I don't want to remove "test" parameter from the parameters list

In the ASM policy I see Signature ID: 200002548

"SQL-INJ waitfor delay (URI)" in Block = YES and Enable = YES

I don't understand why the ASM is not blocking this attack?

 

How do I block this kind of attack using attack signatures?

1 Reply

  • I have noticed that Parameter * was in staging

    and URL * was in staging.

    Enforcing them made the attack to be blocked.