Difference between revisions of "WAF 380122"
From Atomicorp Wiki
(Created page with "{{Infobox |header1 = Rule 380122 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: MySQL and PostgreSQL stored procedure/function inje...") |
Latest revision as of 13:15, 24 August 2020
Rule 380122 | |
---|---|
Status | Active |
Alert Message | Atomicorp.com WAF Rules: MySQL and PostgreSQL stored procedure/function injections |
Contents |
[edit] Description
This rule detects when either database store procedure or function content is detected in a POST from a client to the server. In most cases this indicates that the server is being attacked. If you believe this is a false positive, please report it our security team. This rule is unlikely to generate false positives, and we do not recommend you disable this rule.
[edit] Troubleshooting
[edit] False Positives
If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system.
Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
[edit] Additional Information
[edit] Similar Rules
None.
[edit] Knowledge Base Articles
None.
[edit] Outside References
None.
[edit] Notes
None.