Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Eric_Davis
New Contributor

HTTP.URI.SQL.Injection

I am getting a lot of HTTP.URI.SQL.Injection alerts recently. From what i can tell, it seems to be when an iOS (Apple) app has banner ads. Whenever I launch an app that shows banner ads, I get this alert (or similar): The following intrusion was observed: . date=2012-10-23 time=15:32:04 devname=FGT_Firewall device_id=FGT80Cxxxx log_id=0419016384 type=ips subtype=signature pri=alert severity=high carrier_ep=" N/A" profilegroup=" N/A" profiletype=" N/A" profile=" N/A" src=192.168.1.231 dst=98.139.43.115 src_int=" internal" dst_int=" wan1" policyid=2 intf_policyid=N/A identidx=0 serial=1204932 status=detected proto=6 service=http vd=" root" count=1 attack_name=HTTP.URI.SQL.Injection src_port=61394 dst_port=80 attack_id=15621 sensor=" default" ref=" http://www.fortinet.com/ids/VID15621" user=" N/A" group=" N/A" incident_serialno=1256463166 msg=" web_misc: HTTP.URI.SQL.Injection" I have a Fortigate 80C running v4.0, MR3 patch10. IPS Sensor is using the built-in default (prevent critical attacks) Any idea why this is happening, or how I can disable this one particular signature?
2 REPLIES 2
Sumanth_FTNT
Staff
Staff

Hi Eric, You can disable the particular signature by override option. As you can see below select the particular rule in this case 15621 seen in your logs & set its action to pass. This solves the issue for now. config ips sensor edit " default" set comment " prevent critical attacks" config entries edit 2 set action pass set rule 15621 set status enable next edit 1 set severity medium high critical next end next end Regards Sumanth
Coldfirex
New Contributor

We have seen this some too lately. HTTP.URI.SQL.Injection with a destination of 50.97.180.3 which does appear to be ad-related.
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors