Difference between revisions of "WAF 336461"
From Atomicorp Wiki
(Created page with "{{Infobox |header1 = Rule 336461 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to ma...") |
Latest revision as of 14:00, 24 August 2020
Rule 336461 | |
---|---|
Status | Active |
Alert Message | Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to maliciously access wp-config.php file |
Contents |
[edit] Description
This rule detects when a client attempts to access the wp-config.php file. This file contains the credentials to control a Wordpress site. Gaining access to this file will allow a user to fully control a WordPress site. This is likely an attack on the system.
[edit] Troubleshooting
[edit] False Positives
There are no known false positives with this rule. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Do not disable this rule.
Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
[edit] Additional Information
[edit] Similar Rules
None.
[edit] Knowledge Base Articles
None.
[edit] Outside References
None.
[edit] Notes
None.