For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/def-000-5yb.md. A documentation index is available at /llms.txt.

HTTP requests containing time-based blind SQL injection patterns

Goal

Detect HTTP requests whose parameters include time-delay SQL constructs, including when responses succeed.

Strategy

This rule monitors OCSF HTTP query strings for database-specific delay primitives and groups activity by @ocsf.src_endpoint.ip.

Triage and response

  • Identify the application and database behind the requests and check logs for slow queries or errors.
  • If blind SQL injection is plausible, follow your SQL injection response process.