Difference between revisions of "WAF 390587"
(Created page with "'''Rule ID''' 390586 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: Possible Data leakage - attempt to access backup file (dis...") |
m |
||
Line 13: | Line 13: | ||
'''Description''' | '''Description''' | ||
− | This rule detects if a file that ends in the .swp extension. | + | This rule detects if a file that ends in the .swp extension, and other variants. Some applications use the .swp extension when creating files that store temporary or backup files. Sensitive information is often stored in such temporary files, such as database passwords and other sensitive information when developers work on web files, such as .php, .cgi, .asp and other languages where an attacker can not view the source of those files. Attackers regularly scan for these files to steal credentials that then use to break into systems. This is one of the easier methods for penetrating systems, which is why it so popular with attackers. |
− | + | ||
− | Some applications use the .swp extension when creating files that store temporary or backup files. Sensitive information is often stored in such temporary files. | + | |
'''False Positives''' | '''False Positives''' |
Latest revision as of 20:54, 29 September 2014
Rule ID
390586
Status
Active rule currently published.
Alert Message
Atomicorp.com WAF Rules: Possible Data leakage - attempt to access backup file (disable this rule if you require access to files that end with .swp)
Description
This rule detects if a file that ends in the .swp extension, and other variants. Some applications use the .swp extension when creating files that store temporary or backup files. Sensitive information is often stored in such temporary files, such as database passwords and other sensitive information when developers work on web files, such as .php, .cgi, .asp and other languages where an attacker can not view the source of those files. Attackers regularly scan for these files to steal credentials that then use to break into systems. This is one of the easier methods for penetrating systems, which is why it so popular with attackers.
False Positives
A false positive can occur when you need to access a file with .swp extension.
It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
Tuning Guidance
If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow a URL. Please see the Tuning the Atomicorp WAF Rules page for basic information.
Similar Rules
Knowledge Base Articles
None.
Outside References
None.