You can deploy relaxations to avoid false positives. The SQL Comments Handling parameter gives you an option to specify the type of comments that need to be inspected or exempted during SQL Injection detection.
You can change the SQL Injection type and select one of the 4 options ( SQLKeyword, SQLSplChar, SQLSplCharANDKeyword, SQLSplCharORKeyword) to indicate how to evaluate the SQL keywords and SQL special characters when processing the payload. You can check for SQL wildcard characters. In addition to actions, there are several parameters that can be configured for SQL injection processing. In addition to the Block, Log, Stats and Learn actions, the Web App Firewall profile also offers the option to transform SQL special characters to render an attack harmless. The Web App Firewall offers various action options for implementing SQL Injection protection. You can add new patterns, and you can edit the default set to customize the SQL check inspection. To examine a query portion in requests for injected SQL code, please configure an application firewall profile setting ‘InspectQuer圜ontentTypes’ for the specific content-types.Ī default set of keywords and special characters provides known keywords and special characters that are commonly used to launch SQL attacks.
The Web App Firewall examines the request payload for injected SQL code in three locations: 1) POST body, 2) headers, and 3) cookies. If the Web App Firewall detects unauthorized SQL code in a user request, it either transforms the request, to render the SQL code inactive, or blocks the request. The Web App Firewall HTML SQL Injection check provides special defenses against injection of unauthorized SQL code that might break security. Malicious code or a hacker can use an insecure web form to send SQL commands to the web server. Many web applications have web forms that use SQL to communicate with relational database servers. How to receive notification for signature updates Web App Firewall Support for Cluster Configurations Whitehat WASC Signature Types for WAF Use Supplemental Information about Web App Firewall Policies Managing CSRF Form Tagging Check RelaxationsĬhanging an Web App Firewall Profile TypeĮxporting and Importing an Web App Firewall ProfileĬonfiguring and Using the Learning FeatureĬustom error status and message for HTML, XML, or JSON error objectĬreating and Configuring Web App Firewall Policies Web App Firewall Support for Google Web Toolkit Relaxation and deny rules for handling HTML SQL injection attacks SQL grammar-based protection for HTML and JSON payload Signature Updates in High-Availability Deployment and Build Upgrades Protecting JSON Applications using Signatures Manually Configuring the Signatures FeatureĬonfiguring or Modifying a Signatures Object
Manual Configuration By Using the Command Line Interface
Manual Configuration By Using the Configuration Utility