Difference between revisions of "WAF 390639"
(Created page with ''''Rule ID''' 390639 '''Alert Message''' Atomicorp.com WAF Rules - Just In Time Patch: WordPress trackback resource exhaustion attack '''Description''' This rules detec…') |
Revision as of 17:44, 4 May 2010
Rule ID
390639
Alert Message
Atomicorp.com WAF Rules - Just In Time Patch: WordPress trackback resource exhaustion attack
Description
This rules detects a specific type of resource exhaustion attack on wordpress, or a blind attack on WordPress (for example if wordpress is not installed on the system). WordPress versions prior to 2.8.5 have a vulnerability where an attacker can cause a denial of service to the server. This issue is caused by an error in the "wp-trackbacks.php" script which can be exploited to exhaust all available system resources, creating a denial of service condition.
False Positives
There are no known False Positives for this, however if you believe this is a false positive, it is recommended that you report this to our security team can determine if this is a legitimate case, or if its clever attack on your system and that you not disable this rule until our security team has reviewed the attack. Instructions to report false positives are detailed on the Reporting False Positives wiki page.
Similar Rules
Outside References
CVE-2009-3622 WordPress: Resource exhaustion (DoS) http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3622