Difference between revisions of "WAF 340021"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "'''Rule ID''' 340162 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: PHP Injection Attack 1 '''Description''' This rule ...")
 
m
 
Line 1: Line 1:
 
'''Rule ID'''  
 
'''Rule ID'''  
  
340162
+
340021
  
 
'''Status'''
 
'''Status'''

Latest revision as of 18:25, 7 September 2012

Rule ID

340021

Status

Active rule currently published.

Alert Message

Atomicorp.com WAF Rules: PHP Injection Attack 1

Description

This rule detects Remote File Injection attack attempts. These types of attacks work by tricking an application into download software into itself, which will allow the attacker to download any software they want unto the victims systems, thereby compromising it.

This rules work by detecting known malicious modes and known vulnerable applications that are used to inject code into the system.

False Positives

No known false positives.

It is not recommended that you disable this rule if you believe that you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.

Tuning Guidance

None.

Similar Rules

WAF_340162

WAF_340163

WAF_340165

Knowledge Base Articles

None.

Outside References

Personal tools