WAF 390552
From Atomicorp Wiki
Rule 390552 | |
---|---|
Status | Active |
Alert Message | Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible SQL injection in password or username field, disable this rule if you know your application is not vulnerable to this. |
Contents |
[edit] Description
This rules detects access the use of certain metacharacters that are used in SQL injection attacks for the username and password variables.
If you know your web application is not vulnerable to SQL injection attacks in the username and password variables, disable this rule.
[edit] Troubleshooting
[edit] False Positives
None.
[edit] Tuning Guidance
Please see the Tuning the Atomicorp WAF Rules page for basic information.
[edit] Additional Information
[edit] Similar Rules
None.
[edit] Knowledge Base Articles
None.
[edit] Outside References
None.