Difference between revisions of "WAF 380122"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "{{Infobox |header1 = Rule 380122 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: MySQL and PostgreSQL stored procedure/function inje...")
 

Latest revision as of 14:15, 24 August 2020

Rule 380122
Status Active
Alert Message Atomicorp.com WAF Rules: MySQL and PostgreSQL stored procedure/function injections

Contents

[edit] Description

This rule detects when either database store procedure or function content is detected in a POST from a client to the server. In most cases this indicates that the server is being attacked. If you believe this is a false positive, please report it our security team. This rule is unlikely to generate false positives, and we do not recommend you disable this rule.

[edit] Troubleshooting

[edit] False Positives

If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system.  
Instructions to report false positives are detailed on the Reporting False Positives wiki page.  If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.


[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

None.

[edit] Notes

None.

Personal tools