Difference between revisions of "WAF 380801"
(Created page with "'''Rule ID''' 380801 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules - Virtual Patch: PHP Easter Egg Access '''Description''...") |
Latest revision as of 14:12, 27 December 2012
Rule ID
380801
Status
Active rule currently published.
Alert Message
Atomicorp.com WAF Rules - Virtual Patch: PHP Easter Egg Access
Description
This rule detects attempts to access PHP Easter Egges. PHP contains several "easter eggs" that can be sent to any PHP application to determine if the system is running PHP and what version of PHP a system is using. PHP will reveal this information, via these Easter Eggs, even if PHP is configured to not reveal its version or other information.
This rule works by detecting the use of these easter eggs, which are PHP session IDs reserved as easter eggs. The easter eggs are referenced in the section "Outside References" at the end of this article.
False Positives
There are no known false positives for this condition. If you believe your version of PHP is not vulnerable to this probe, then disable this rule. We do not recommend you do this without first testing your PHP implementation against the known probe easter eggs.
Tuning Guidance
Please see the Tuning the Atomicorp WAF Rules page for basic information.
Similar Rules
None.
Knowledge Base Articles
None.
Outside References