WAF 390552

From Atomicorp Wiki
Revision as of 12:51, 23 November 2012 by Mshinn (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Rule 390552
Status Active
Alert Message Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible SQL injection in password or username field, disable this rule if you know your application is not vulnerable to this.

Contents

[edit] Description

This rules detects access the use of certain metacharacters that are used in SQL injection attacks for the username and password variables.

If you know your web application is not vulnerable to SQL injection attacks in the username and password variables, disable this rule.

[edit] Troubleshooting

[edit] False Positives

None.

[edit] Tuning Guidance

Please see the Tuning the Atomicorp WAF Rules page for basic information.

[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

None.

[edit] Notes

Personal tools