WAF 380801

From Atomicorp Wiki
Revision as of 14:12, 27 December 2012 by Mshinn (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Rule ID

380801

Status

Active rule currently published.

Alert Message

Atomicorp.com WAF Rules - Virtual Patch: PHP Easter Egg Access

Description

This rule detects attempts to access PHP Easter Egges. PHP contains several "easter eggs" that can be sent to any PHP application to determine if the system is running PHP and what version of PHP a system is using. PHP will reveal this information, via these Easter Eggs, even if PHP is configured to not reveal its version or other information.

This rule works by detecting the use of these easter eggs, which are PHP session IDs reserved as easter eggs. The easter eggs are referenced in the section "Outside References" at the end of this article.

False Positives

There are no known false positives for this condition. If you believe your version of PHP is not vulnerable to this probe, then disable this rule. We do not recommend you do this without first testing your PHP implementation against the known probe easter eggs.

Tuning Guidance

Please see the Tuning the Atomicorp WAF Rules page for basic information.

Similar Rules

None.

Knowledge Base Articles

None.

Outside References

http://www.0php.com/php_easter_egg.php

Personal tools