Difference between revisions of "WAF 360151"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "{{Infobox |header1 = Rule 360151 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: PHP Injection Attack: Variable Function Call Found...")

Revision as of 14:14, 5 October 2023

Rule 360151
Status Active
Alert Message Atomicorp.com WAF Rules: PHP Injection Attack: Variable Function Call Found

Contents

Description

This rule detects Possible PHP injection attacks. It does this by looking for either combinations of metacharacters and word/character segements that may appear to be PHP variable function calls. If you have a false positive with this rule, please report it to us.


Troubleshooting

False Positives

If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.

Tuning Guidance

If you want to disable or tune this rule, please see the Tuning the Atomicorp WAF Rules page for basic information.

Additional Information

Similar Rules

None.

Knowledge Base Articles

None.

Outside References

None.

Notes

None.

Personal tools