Difference between revisions of "WAF 340006"
(Created page with ''''Rule ID''' 340006 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: Generic Path Recursion denied in URI/ARGS '''Description'…') |
m |
||
Line 23: | Line 23: | ||
'''False Positives''' | '''False Positives''' | ||
− | Some applications may use recursions to | + | Some applications may use recursions to access some files. Therefore a false positive can occur. It is not recommended that you disable this rule without ensuring that this is both normal and safe for your application. For example, if your application allows directory recursions, but does not limit recursion this may make it possible for an attacker to access any file on your system. |
+ | |||
+ | If you believe this is both safe, and a false positive, please report this to our security team. We can determine if this is a legitimate case, or if its clever attack on your system and if a modification to the rules is advised to allow this activity. Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page. | ||
If you wish to tune this rule yourself, please see the [[Tuning the Atomicorp WAF Rules]] page for basic information. | If you wish to tune this rule yourself, please see the [[Tuning the Atomicorp WAF Rules]] page for basic information. |
Latest revision as of 16:01, 3 February 2013
Rule ID
340006
Status
Active rule currently published.
Alert Message
Atomicorp.com WAF Rules: Generic Path Recursion denied in URI/ARGS
Description
This rule is detecting the use of path recursion in an Argument, Header or in the URI. An example of a recursion is:
../..
An example attack could be to get to a protected file on the system. For example:
../../../../../etc/passwd
False Positives
Some applications may use recursions to access some files. Therefore a false positive can occur. It is not recommended that you disable this rule without ensuring that this is both normal and safe for your application. For example, if your application allows directory recursions, but does not limit recursion this may make it possible for an attacker to access any file on your system.
If you believe this is both safe, and a false positive, please report this to our security team. We can determine if this is a legitimate case, or if its clever attack on your system and if a modification to the rules is advised to allow this activity. Instructions to report false positives are detailed on the Reporting False Positives wiki page.
If you wish to tune this rule yourself, please see the Tuning the Atomicorp WAF Rules page for basic information.
Tuning Recommendations
If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow recursions.
Similar Rules
Knowledge Base Articles
None.
Outside References