Difference between revisions of "WAF 340159"
(Created page with "'''Rule ID''' 340159 '''Status''' Active rule currently published. '''Alert Message''' Generic SQL inline command protection (MM) '''Description''' This rule detec...") |
Latest revision as of 15:07, 30 July 2013
Rule ID
340159
Status
Active rule currently published.
Alert Message
Generic SQL inline command protection (MM)
Description
This rule detects SQL content. It is tuned to try and ignore this in cases where this may be normal (SQL application for example). An example attack could be to get dump user passwords from a database:
union select from usernames
False Positives
Some applications use SQL in their arguments in ways that we may not have seen before, and therefore we have not tuned the rules to ignore this legitimate behavior. Some applications are vulnerable to SQL injection attacks and this may be an actual attack, and in some very bad cases an application may use raw SQL in an unprotected argument to function properly. Therefore a false positive can occur, and we recommend that you not disable this rule.
Instead, we recommend that you report this to use as a false positive. Our security team can determine if this is a legitimate case for you, or if its clever attack on your system and we will put out an update to the rules to make sure your application can function and that you are not opening your system to further attack. Instructions to report false positives are detailed on the Reporting False Positives wiki page.
If you wish to tune this rule yourself, please see the Tuning the Atomicorp WAF Rules page for basic information.
Tuning Recommendations
If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to SQL.
Similar Rules
Knowledge Base Articles
None.
Outside References