Difference between revisions of "WAF 340014"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "{{Infobox |header1 = Rule 340014 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: CMD injection }} = Description = This rule detect...")

Revision as of 13:20, 24 August 2020

Rule 340014
Status Active
Alert Message Atomicorp.com WAF Rules: CMD injection

Contents

Description

This rule detects when a client attempts to access a command line tool on the server via the web server. This means the client either tried to access or find the tool on the system. This can indicate that an attacker is attempting to run commands on the server.

Troubleshooting

False Positives

If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Do not disable this rule.

Instructions to report false positives are detailed on the Reporting False Positives wiki page.  If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.


Additional Information

Similar Rules

None.

Knowledge Base Articles

None.

Outside References

None.

Notes

None.

Personal tools