Difference between revisions of "WAF 340619"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with ''''Rule ID''' 340619 '''Alert Message''' Atomicorp.com WAF Rules: HTTP Smuggling Attack. '''Description''' This attack combines transfer encoding and content length att…')
 
m
 
Line 2: Line 2:
  
 
340619
 
340619
 +
 +
'''Status'''
 +
 +
Active rule currently published.
  
 
'''Alert Message'''   
 
'''Alert Message'''   
  
Atomicorp.com WAF Rules: HTTP Smuggling Attack.
+
Atomicorp.com WAF Rules: URL detected as argument, possible Remote File Injection attempt detected
  
 
'''Description'''   
 
'''Description'''   
  
This attack combines transfer encoding and content length attacksThere is no legitimate traffic that uses this method, this is an attack.
+
This rule detects possible Remote File Injection attemptsThese types of attacks work by tricking an application into download software into itself, which will allow the attacker to download any software they want unto the victims systems, thereby compromising it. 
 +
 
 +
This rule works by detecting the use of a URL as an argument.
  
 
'''False Positives'''
 
'''False Positives'''
  
There are no known False Positives for this.   
+
A false positive can occur when an application legitimately sets an argument to a URL, and does this using a previously unknown argument or method to store this URL.  The rules contain a large library of known web applications and safe methods for using URLs, and can detect known safe methods and ignore themHowever it is possible for a new or custom application to do this in an unknown manner and incorrectly trigger this rule.
  
If you believe this is a false positive, it is recommended that you report this to our security team can determine if this is a legitimate case, or if its clever attack on your system.  Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page.
+
It is not recommended that you disable this rule if you have a false positive.  If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system.  Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page.  If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
 +
 
 +
'''Tuning Guidance'''
 +
 
 +
If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow a URL. Please see the [[Tuning the Atomicorp WAF Rules]] page for basic information.
  
 
'''Similar Rules'''
 
'''Similar Rules'''
  
 +
[[WAF_340163]]
 +
 +
[[WAF_340165]]
 +
 +
'''Knowledge Base Articles'''
 +
 +
None.
  
 
'''Outside References'''
 
'''Outside References'''
 +
 +
None.

Latest revision as of 13:53, 1 August 2024

Rule ID

340619

Status

Active rule currently published.

Alert Message

Atomicorp.com WAF Rules: URL detected as argument, possible Remote File Injection attempt detected

Description

This rule detects possible Remote File Injection attempts. These types of attacks work by tricking an application into download software into itself, which will allow the attacker to download any software they want unto the victims systems, thereby compromising it.

This rule works by detecting the use of a URL as an argument.

False Positives

A false positive can occur when an application legitimately sets an argument to a URL, and does this using a previously unknown argument or method to store this URL. The rules contain a large library of known web applications and safe methods for using URLs, and can detect known safe methods and ignore them. However it is possible for a new or custom application to do this in an unknown manner and incorrectly trigger this rule.

It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.

Tuning Guidance

If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow a URL. Please see the Tuning the Atomicorp WAF Rules page for basic information.

Similar Rules

WAF_340163

WAF_340165

Knowledge Base Articles

None.

Outside References

None.

Personal tools