Difference between revisions of "WAF 340021"
(Created page with "'''Rule ID''' 340162 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: PHP Injection Attack 1 '''Description''' This rule ...") |
m |
||
Line 1: | Line 1: | ||
'''Rule ID''' | '''Rule ID''' | ||
− | + | 340021 | |
'''Status''' | '''Status''' |
Latest revision as of 17:25, 7 September 2012
Rule ID
340021
Status
Active rule currently published.
Alert Message
Atomicorp.com WAF Rules: PHP Injection Attack 1
Description
This rule detects Remote File Injection attack attempts. These types of attacks work by tricking an application into download software into itself, which will allow the attacker to download any software they want unto the victims systems, thereby compromising it.
This rules work by detecting known malicious modes and known vulnerable applications that are used to inject code into the system.
False Positives
No known false positives.
It is not recommended that you disable this rule if you believe that you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
Tuning Guidance
None.
Similar Rules
Knowledge Base Articles
None.
Outside References