WAF 340006

From Atomicorp Wiki
Revision as of 20:46, 25 November 2009 by Mshinn (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Rule ID

340006

Status

Active rule currently published.

Alert Message

Atomicorp.com WAF Rules: Generic Path Recursion denied in URI/ARGS

Description

This rule is detecting the use of path recursion in an Argument, Header or in the URI. An example of a recursion is:

 ../..

An example attack could be to get to a protected file on the system. For example:

 ../../../../../etc/passwd

False Positives

Some applications may use recursions to get some files. Therefore a false positive can occur. It is not recommended that you disable this rule. If this is a false positive, please report this to our security team can determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page.

If you wish to tune this rule yourself, please see the Tuning the Atomicorp WAF Rules page for basic information.

Tuning Recommendations

If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow recursions.

Similar Rules

WAF_340007

Knowledge Base Articles

None.

Outside References

Personal tools