Difference between revisions of "WAF 340112"
From Atomicorp Wiki
(Created page with "{{Infobox |header1 = Rule 340112 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: cross site scripting attempt to execute Javascript ...") |
Latest revision as of 13:46, 24 August 2020
Rule 340112 | |
---|---|
Status | Active |
Alert Message | Atomicorp.com WAF Rules: cross site scripting attempt to execute Javascript code |
Contents |
[edit] Description
This rule detects when a client is attempting to inject javascript via either an untrusted argument, untrusted application or both. This may be a cross site scripting attack.
[edit] Troubleshooting
[edit] False Positives
If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Do not disable this rule.
Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
[edit] Additional Information
[edit] Similar Rules
None.
[edit] Knowledge Base Articles
None.
[edit] Outside References
None.
[edit] Notes
None.