Difference between revisions of "WAF 390552"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "{{Infobox |header1= Rule 390552 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible SQL injection ...")
 

Latest revision as of 12:51, 23 November 2012

Rule 390552
Status Active
Alert Message Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible SQL injection in password or username field, disable this rule if you know your application is not vulnerable to this.

Contents

[edit] Description

This rules detects access the use of certain metacharacters that are used in SQL injection attacks for the username and password variables.

If you know your web application is not vulnerable to SQL injection attacks in the username and password variables, disable this rule.

[edit] Troubleshooting

[edit] False Positives

None.

[edit] Tuning Guidance

Please see the Tuning the Atomicorp WAF Rules page for basic information.

[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

None.

[edit] Notes

Personal tools