<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS not preventing sql injection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259610#M53655</link>
    <description>&lt;P&gt;Do you not see even "Detect" logs, how does your protections activation look for that "strict" profile?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any other considerations that we should be aware of such as NAT etc.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="protections.png" style="width: 389px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31702i601B4EEBB9D0EBCF/image-size/large?v=v2&amp;amp;px=999" role="button" title="protections.png" alt="protections.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Oct 2025 10:16:57 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2025-10-10T10:16:57Z</dc:date>
    <item>
      <title>IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259599#M53654</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;long post - grateful if you could help me with this one:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For a demonstration, I created a small web/DB application intentionally vulnerable to SQL injection and ran sqlmap (a standard tool for pen testing sql injections) against it.&lt;/P&gt;&lt;P&gt;Traffic (plain HTTP on port 80) was routed through a CheckPoint R81.20 with IDP enabled using the "strict" profile.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To my surprise, the sql injection still worked and sqlmap was able to enumerate and dump the complete database.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Sqlmap used several dozens very obvious SQL injection attempts. The firewall logged and passed all of them, without preventing or noticing the SQL injection attack - with one exception:&lt;/P&gt;&lt;P&gt;The protection "Sqlmap Automated SQL Injection Tool" fired once, and only once.&lt;/P&gt;&lt;P&gt;This did not prevent the other requests, and did not stop the extraction of the data base.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Now, did I miss something in configuring the firewall IDP, or do the protections simply not protect against sqlmap?&lt;/P&gt;&lt;P&gt;On the firewall, I checked:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPS, Anti-Bot, Anti-Virus Blades are enabled:&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-60px"&gt;# enabled_blades&lt;BR /&gt;fw av ips anti_bot&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IDP is enabled, pattern are up-to-date, firewall is using the "Strict"-Profile:&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-60px"&gt;# ips stat&lt;BR /&gt;IPS Status: Enabled&lt;BR /&gt;Active Profiles:&lt;BR /&gt;Strict&lt;BR /&gt;IPS Update Version: 635256678&lt;BR /&gt;Global Detect: Off&lt;BR /&gt;Bypass Under Load: Off&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPS bypass under load is diabled:&lt;/LI&gt;&lt;/UL&gt;&lt;P class="lia-indent-padding-left-60px"&gt;# ips bypass stat&lt;BR /&gt;IPS Bypass Under Load: Disabled&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The target network 172.20.11.0/24 is in the "Protected Scope" (Security Policies / Threat Prevention / Custom Policy)&lt;/LI&gt;&lt;LI&gt;There are no exceptions to the IDP protections (Manage &amp;amp; Settings / Blades / General / Inspection Settings / Exceptions)&lt;/LI&gt;&lt;LI&gt;There are no exceptions in the Threat Prevention Policy (Security Policies / Threat Prevention / Exceptions)&lt;/LI&gt;&lt;LI&gt;Assigned Inspection Profile is "Recommended Inspections" (Manage &amp;amp; Settings / Blades / General / Inspection Settings / Gateways)&lt;/LI&gt;&lt;LI&gt;Topology for firewall interfaces is set:&lt;UL&gt;&lt;LI&gt;eth1 (towards attacker/sqlmap) is "External"&lt;/LI&gt;&lt;LI&gt;eth2 (towards vulnerable application) is "Defined by routes (Internal)"&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;IPS Activation Mode is "According to Policy", not "Detect only" (Gateways / "firewall" / IPS)&lt;/LI&gt;&lt;LI&gt;Installing the Threat Prevention Policy gives no warnings.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Here is an example of a successful sqlmap command:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;sqlmap --batch \
--flush-session \
--dump \
-D mydb_name \
-T admins \
--headers="Content-Type: application/json" \
-u http://172.20.11.11/search \
--random-agent \
--data='{"text1":"*", "andor":"and", "text2":""}'&lt;/LI-CODE&gt;&lt;P&gt;The vulnerability is in an unchecked JSON parameter ("text1") sent as a POST request) to /search.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;An example of a sqlmap request the firewall lets pass is this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;POST /search HTTP/1.1
Content-Length: 85
Content-Type: application/json
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.6 Safari/605.1.15
Host: 172.20.11.11
Accept: */*
Accept-Encoding: gzip,deflate
Connection: close

{"text1":";SELECT DBMS_PIPE.RECEIVE_MESSAGE(CHR(106)||CHR(74)||CHR(109)||CHR(86),5) FROM DUAL--", "andor":"and", "text2":""}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What else can I check to find out why the sql injection is not blocked - any thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 07:45:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259599#M53654</guid>
      <dc:creator>Toolmaker</dc:creator>
      <dc:date>2025-10-10T07:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259610#M53655</link>
      <description>&lt;P&gt;Do you not see even "Detect" logs, how does your protections activation look for that "strict" profile?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any other considerations that we should be aware of such as NAT etc.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="protections.png" style="width: 389px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31702i601B4EEBB9D0EBCF/image-size/large?v=v2&amp;amp;px=999" role="button" title="protections.png" alt="protections.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 10:16:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259610#M53655</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-10-10T10:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259616#M53656</link>
      <description>&lt;P&gt;and what object was used to allow the connection, the builtin http object?&lt;/P&gt;
&lt;P&gt;I would think inspections are tied to the selected protocol parser.&lt;/P&gt;
&lt;P&gt;/Henrik&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 10:26:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259616#M53656</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2025-10-10T10:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259662#M53657</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;- settings are exactly as in your image&lt;/P&gt;&lt;P&gt;- no NAT configured&lt;/P&gt;&lt;P&gt;- no Detect Log entries&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Bernhard&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 15:47:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259662#M53657</guid>
      <dc:creator>Toolmaker</dc:creator>
      <dc:date>2025-10-10T15:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259663#M53658</link>
      <description>&lt;P&gt;Yes, the unmodified, predefined "http" service using protocol&amp;nbsp; "HTTP".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 15:52:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259663#M53658</guid>
      <dc:creator>Toolmaker</dc:creator>
      <dc:date>2025-10-10T15:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259701#M53659</link>
      <description>&lt;P&gt;If you're expecting the "Core" SQL Injection protection to fire then there are potentially additional configurations required (see below).&lt;/P&gt;
&lt;P&gt;If however the expectation is that another of the IPS protection should trigger I would suggest it may need to be reviewed with TAC who can then do a remote session and take any necessary debugs / packet captures internally etc.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SQL Injection.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31719i28F28543575E0A78/image-size/large?v=v2&amp;amp;px=999" role="button" title="SQL Injection.png" alt="SQL Injection.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 03:04:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259701#M53659</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-10-11T03:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259708#M53660</link>
      <description>&lt;P&gt;The Strict Profile is in Prevent (block) for most of the 901 SQL Injections (in today's updated IPS database), but 8 of the Protections (1 Core and 7 ThreatCloud) are note enabled for blocking.&lt;/P&gt;
&lt;P&gt;4 of those are &lt;STRONG&gt;Performance Impact&lt;/STRONG&gt; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Critical&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;, which means that Profiles never consider those for use, and the administrator must enable them manually.&lt;/P&gt;
&lt;P&gt;The other 3 are in Detect mode because of &lt;STRONG&gt;Low Confidence&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you could try it to set them to &lt;STRONG&gt;Prevent&lt;/STRONG&gt; using the Override option and then test. See screenshots and files attached.&lt;/P&gt;
&lt;P&gt;In the IPS Protections window:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Search "SQL Injection"&lt;/LI&gt;
&lt;LI&gt;Click the Strict column so sort (look for the 7 at the top)&lt;/LI&gt;
&lt;LI&gt;Select them all&lt;/LI&gt;
&lt;LI&gt;Actions &amp;gt; Select Protections &amp;gt; Prevent Selected&lt;/LI&gt;
&lt;LI&gt;Read the message/s carefully&lt;/LI&gt;
&lt;LI&gt;Publish&lt;/LI&gt;
&lt;LI&gt;Install TP policy&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keep an eye on the cpview running on the gateway to see how much performance impact you see when running testing.&lt;/P&gt;
&lt;P&gt;You can also run &lt;STRONG&gt;hcp -r all&lt;/STRONG&gt; or &lt;STRONG&gt;hcp -r "Threat Prevention"&lt;/STRONG&gt; during the test and see what that says.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Something else you can try is an IOC Indicator (IOC File). Add that and modify the Strict Profile to reference it.&lt;/P&gt;
&lt;P&gt;That will force you to save it as a newly named Profile (so that your changes can stick) and then make sure that is in the rule (replace Strict).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/Content/Topics-TPG/Uploading-Threat-Indicator-Files-through-SmartConsole.htm?Highlight=IOC%20File" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/Content/Topics-TPG/Uploading-Threat-Indicator-Files-through-SmartConsole.htm?Highlight=IOC%20File&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 12:29:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259708#M53660</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2025-10-11T12:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259709#M53661</link>
      <description>&lt;P&gt;This is something else that you can explore.&lt;/P&gt;
&lt;P&gt;Each protection carried tags/categories.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;EDIT (take 2)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is probably not relevant and you can ignore it.&lt;/P&gt;
&lt;P&gt;One thing to be aware of if you look into this:&lt;/P&gt;
&lt;P&gt;"These categories only filter &lt;STRONG&gt;out&lt;/STRONG&gt; or &lt;STRONG&gt;add&lt;/STRONG&gt; protections that &lt;STRONG&gt;comply&lt;/STRONG&gt; with the &lt;STRONG&gt;Profile settings&lt;/STRONG&gt;&amp;nbsp;(Confidence, Severity, Performance in the &lt;STRONG&gt;General Policy&lt;/STRONG&gt; page of the Profile).&lt;/P&gt;
&lt;P&gt;For example, if a protection is inactive because of its Performance rating, it is not enabled&amp;nbsp;even if its category is in Protections to activate."&lt;/P&gt;
&lt;P&gt;Reference:&lt;/P&gt;
&lt;P&gt;Page 64&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/CP_R81.20_ThreatPrevention_AdminGuide.pdf" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/CP_R81.20_ThreatPrevention_AdminGuide.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In summary:&lt;/P&gt;
&lt;P&gt;If you use the settings in the screenshot (Protections to activate &amp;gt; SQL Injection) then the result is that only &lt;STRONG&gt;889&lt;/STRONG&gt; of the total 16777 Protections will be in &lt;STRONG&gt;Prevent&lt;/STRONG&gt; mode.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;15,892 will be &lt;STRONG&gt;Inactive&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;3 will be &lt;STRONG&gt;Detect&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It would be great for performance and only SQL Injection testing but not other IPS protections are active.&lt;/P&gt;
&lt;P&gt;Not great for performance if the Critical Performance impact Protections are enabled with the Override.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: The number of Protections in the ThreatCloud database during testing on 11 Oct. 2025&lt;/P&gt;</description>
      <pubDate>Sun, 12 Oct 2025 19:57:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259709#M53661</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2025-10-12T19:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPS not preventing sql injection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259711#M53662</link>
      <description>&lt;P&gt;I would certainly follow what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18248"&gt;@Don_Paterson&lt;/a&gt;&amp;nbsp; suggested, but if no dice, would open TAC case.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 13:54:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-not-preventing-sql-injection/m-p/259711#M53662</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-11T13:54:17Z</dc:date>
    </item>
  </channel>
</rss>

