WAF 390582

From Atomicorp Wiki
Jump to: navigation, search

Rule ID

390582

Status

Active rule currently published.

Alert Message

Atomicorp.com WAF Rules: Possible Data leakage - attempt to access backup file (disable this rule if you require access to files that end with .bak)

Description

This rule detects if a file that ends in the .bak extension.

Some applications use .bak to store temporary or backup files. Sensitive information is often stored in such temporary files.

False Positives

A false positive can occur when you need to access a file with .bak extension.

It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.

Tuning Guidance

If you know that this behavior is acceptable for your application, you can tune it by identifying the argument that is being triggered, and specifically allowing that argument for that application to allow a URL. Please see the Tuning the Atomicorp WAF Rules page for basic information.

Similar Rules

WAF_390581

WAF_390583

WAF_390584

WAF_390586

WAF_390587

Knowledge Base Articles

None.

Outside References

None.

Personal tools