Jump to content

SQL injection attack or similar


sal88

This topic is 1637 days old. Please don't post here. Open a new topic instead.

Recommended Posts

Hi all

As per our migration of our FileMaker Server to the cloud, we are essentially exposing it to the Internet. We have locked down vulnerabilities to the best of our knowledge, e.g. with the use of MFA. However as we will not be having a stateful firewall, we wonder if this will leave us exposed to other forms of attacks similar to SQL injection attacks? Do we need a web application firewall (or FileMaker equivalent) in front of it?

Is it only the FileMaker client (or webdirect) that can execute operations in Filemaker Server via the open port?

Thanks

Link to comment
Share on other sites

How did you implement MFA?  By using an OAuth provider that supports it?

Can you expand a bit on not having a stateful firewall?  I would think that a firewall is an absolute must and open only the ports that you'll need.  Which is 5003 for FMP and FM Go clients and 443 for WebDirect clients.

Link to comment
Share on other sites

Hey Wim

We're using Azure AD with MFA and the oAuth that is built in to filemaker.

We do have a firewall in the form of a network security group in Azure which allows us to lock down the ports however the firewall will not be interpreting the traffic (like a stateful firewall would be), it will just be directing it.

Are there any threats out there to Filemaker Server that can attack (unauthenticated) via ports 5003 and 443, short of an authentication breach?

Thanks

Edited by sal88
Link to comment
Share on other sites

This topic is 1637 days old. Please don't post here. Open a new topic instead.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.