Hi ,
(reedited after more testing)
In v8.1 we're querying the rest api server as shown:
POST /AppServer/api/entities/Person?limit=15&displaycolumns=CCC_NIF;CentralAccount
Hi ,
(reedited after more testing)
In v8.1 we're querying the rest api server as shown:
POST /AppServer/api/entities/Person?limit=15&displaycolumns=CCC_NIF;CentralAccount
We have a similar problem while migrating the web portal from 7.1.3 to 8.1.1.
We get db journal errors and lockouts:
SQL injection by brute force attack detected in WHERE clause: ...
...
User session of…
Hello,
Is this a general problem with using LIKE operators in where clauses?
Yes.
Please see the following related to this as well: https://support.oneidentity.com/identity-manager/kb/288731/false-positive…
In this particular case, the "Fullpath LIKE" query can be rewritten using the BaseTreeCollection table. Try this:
UID_AErole in (select UID_Org
from basetreecollection
where uid_parentorg in …
Are you seeing this message even on your first request or did you find this in the log after doing many sub-sequent query checks?
Are you seeing this message even on your first request or did you find this in the log after doing many sub-sequent query checks?
Hi Markus,
Thanks for replying.
On the first request, but I cannot tell when it started. I got a SR from our Development dept. with the headsup.
I've tried also in version 8.1.1 and it happens as well.
This "POST" query: "">iam-desarrollo.eprinsa.org/.../Person
with the following "where" clauses :
With my Rest client, I start sending example 1 requests and it works just fine, results ok. Then I start sending example 2 requests and the injection procedure begins. Right away I switch back to example 1 and the problem is gone, no time penalties. So it seems the like operator is not wanted.
At first I thought it could be related to a recent SR that I raised for defect 31881 in 8.1, but as it also happens in 8.1.1 and the dll's have been upgraded too I've discarded that thought.
Regards!
We are living in a world where we must protect our system against SQL injection attacks and an API endpoint like the REST API is one of those areas. The protection itself is of course updated between the versions of One Identity Manager if new threads arise. So it might be, that you are affected by one of those protection mechanisms.
I kindly suggest that you are contacting support to work with you solving your issue. I do know that we had some adaptions made post 8.1.1 that may help you in your current situation.