As an example, if using conditions for menu items and object lists containing the SQL SUBSTRING() method, this will be detected as SQL injection and the session aborted.
The displayed error may be: "Potential SQL injection attack by brute-force".
This is a product defect (31652).
WORKAROUND
Avoid the SQL substring method.
STATUS
Please note that 'Improved protection against damaging SQL statements' was implemented as Enhancement ID 31652 in version 8.1.1: https://support.oneidentity.com/technical-documents/identity-manager/8.1.1/release-notes#TOPIC-1243838.
A caution about expectations of this enhancement:
One Identity Manager (1IM) allows for the definition of customer-specific WHERE clauses, which all run via one interface. The object layer is not able to detect if a certain command comes from a hacker or from a 1IM application which contains legitimate WHERE clauses. A perfect balance between security and usability will not be possible for these reasons.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center