<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTP and sql injection by facebook-mail in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44248#M32483</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;I am checking with engineering on partial pcap issue. For better tracking, I'd recommend filing a support case though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Oct 2010 09:46:12 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2010-10-28T09:46:12Z</dc:date>
    <item>
      <title>HTTP and sql injection by facebook-mail</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44245#M32480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We recently found a threat "HTTP SQL Injection Attempt" (ID = 30514) with the application "facebook-mail".&lt;/P&gt;&lt;P&gt;We found that information quite strange. What does it mean exactly?&lt;/P&gt;&lt;P&gt;Was there some patterns (for example a SQL specific pattern) in the mail?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a packets capture, but I wasn't be able to find something interesting in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure that some experts here can help me to understand that point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Oct 2010 16:49:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44245#M32480</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-27T16:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP and sql injection by facebook-mail</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44246#M32481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked the PCAP you sent but since it was incomplete, I couldn't see the HTTP contents. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The very likely cause of the signature triggering would be that there was a URL contained within the traffic which contained SQL injection traffic. If you have the entire PCAP available, I can help in analyzing that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sandeep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Oct 2010 03:53:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44246#M32481</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-28T03:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP and sql injection by facebook-mail</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44247#M32482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sjain,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PCAP is the only pcap i have (obtained from the Appliance with the option "packet capture" on my vulnerabilities profiles).&lt;/P&gt;&lt;P&gt;Is it possible to obtain more complete captures in the future?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you are right about the URL containing the SQL injection, unfortunately, it seems no possible to check now...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Oct 2010 08:39:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44247#M32482</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-28T08:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP and sql injection by facebook-mail</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44248#M32483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;I am checking with engineering on partial pcap issue. For better tracking, I'd recommend filing a support case though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Oct 2010 09:46:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44248#M32483</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-28T09:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP and sql injection by facebook-mail</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44249#M32484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you are filing a support case, please let me know the case #. Also include "show system info" output in the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 20:26:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/http-and-sql-injection-by-facebook-mail/m-p/44249#M32484</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-11-02T20:26:39Z</dc:date>
    </item>
  </channel>
</rss>

