Difference between revisions of "WAF 340138"
m (Created page with "'''Rule ID''' 340138 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: Fake image file shell attack '''Description''' This ru...") |
Revision as of 13:18, 20 July 2011
Rule ID
340138
Status
Active rule currently published.
Alert Message
Atomicorp.com WAF Rules: Fake image file shell attack
Description
This rule detects non image content on an image file. This method is sometimes used to hide shells and other unauthorized files as image files.
False Positives
There are no known false positives for this rule. It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
Tuning Guidance
If you know that this behavior is acceptable for your application, you can tune by following the guidance on the Tuning the Atomicorp WAF Rules page.
Similar Rules
None.
Knowledge Base Articles
None.
Outside References
None.