CQL injections attempts

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect CQL injections attempts on web services accessing to data from Cassandra databases. Such security activity generally indicates that an attacker is trying to exploit a potential CQL injection vulnerability or steal sensitive data.

Strategy

Monitor application security events to detect SQL (@appsec.security_activity:attack_attempt.sql_injection) & CQL (@appsec.rule_id:dog-000-001) injection attempts on distributed traces where external CQL queries are performed (@_dd.appsec.enrichment.has_cassandra:true).
Also, look at SQL injection triggers because CQL syntax is similar enough to SQL syntax that the SQL patterns catch CQL injection payloads.

The signal severity is determined based on the underlying service behavior:

  • HIGH Substantial rate of SQL/CQL injection attempts on services executing CQL queries, and resulting in Cassandra exceptions.
  • MEDIUM High rate of SQL/CQL injection attempts on services executing CQL queries.

Triage and response

  1. Consider blocking the attacking IP(s) temporarily to prevent them from reaching deeper parts of your production systems.
  2. Review the 5xx errors and the other application security events detected to assess the impact on the services.
  3. Investigate if the parameters are ending up in the CQL query without sanitization. If they do, fix the code.
PREVIEWING: brett.blue/embedded-collector-release