Active rule currently published.
Atomicorp.com WAF Rules - Virtual Just In Time Patch: Oscommerce Exploit
This rule detects attempts to exploit a vulnerability in osCommerce. Some attacks are made "blindly", which means that the attacker is simply looking for vulnerable installations of oscommerce. Therefore, this rule may trigger even on systems that do not have oscommerce installed, as the WAF will stop the attack before the web server can even process it (and send a 404, as the application would not exist).
No known false positives exist.
It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow a URL. Please see the Tuning the Atomicorp WAF Rules page for basic information.
Knowledge Base Articles