Active rule currently published.
Atomicorp.com WAF Rules: PHP Injection Attack 1
This rule detects Remote File Injection attack attempts. These types of attacks work by tricking an application into download software into itself, which will allow the attacker to download any software they want unto the victims systems, thereby compromising it.
This rules work by detecting known malicious modes and known vulnerable applications that are used to inject code into the system.
No known false positives.
It is not recommended that you disable this rule if you believe that you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
Knowledge Base Articles