It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda WAF-as-a-Service

Claroty JSON SQLi Vulnerabilities

  • Last updated on

This article provides an update on the recently discovered JSON-based SQL Injection Vulnerability by Team82.

The Claroty T82 research team released a blog last week demonstrating a newly identified SQL injection in JSON-based SQL and how it bypasses many name-brand WAF vendors.

Exploit

The attack technique involves appending JSON syntax to SQL injection payloads. The attack affects only web applications using JSON.

Barracuda WAFaaS Mitigation

The Barracuda WAF-as-a-Service protect against this attack with an update in the existing SQL injection category of the Smart Signatures. 

The default SQL injection medium and strict checks do not detect this variant, which employs JSON syntax. The new signature detects all identified variants of the JSON syntax-based attacks.

Barracuda Networks has pushed the new signature through Attack Definition Update version 1.222.  The Release Notes is updated to reflect the changelog. 

Related Articles: