WAF 340021

From Atomicorp Wiki
Jump to: navigation, search

Rule ID



Active rule currently published.

Alert Message

Atomicorp.com WAF Rules: PHP Injection Attack 1


This rule detects Remote File Injection attack attempts. These types of attacks work by tricking an application into download software into itself, which will allow the attacker to download any software they want unto the victims systems, thereby compromising it.

This rules work by detecting known malicious modes and known vulnerable applications that are used to inject code into the system.

False Positives

No known false positives.

It is not recommended that you disable this rule if you believe that you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.

Tuning Guidance


Similar Rules




Knowledge Base Articles


Outside References

Personal tools