Difference between revisions of "WAF 390707"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "'''Rule ID''' 390707 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules: Too many arguments in request (max set to 2048, increase a...")
 
m (False Positives)
 
(2 intermediate revisions by one user not shown)
Line 1: Line 1:
'''Rule ID'''
+
{{Infobox
 +
|header1 = Rule 390707
 +
|label2 = Status
 +
|data2 = Active
 +
|label3 = Alert Message
 +
|data3 = Atomicorp.com WAF Rules: Too many arguments in request (max set to 1000, increase as necessary for your system)
 +
}}
  
390707
+
= Description =
  
'''Status'''
+
This rule simply detects if a single request has more that 1000 arguments.  This rule is designed to help protect your system from certain Denial of Service (DOS) attacks, such as the PHP Hash DOS attack.
  
Active rule currently published.
+
= Troubleshooting =
  
'''Alert Message''' 
+
== False Positives ==
  
Atomicorp.com WAF Rules: Too many arguments in request (max set to 2048, increase as necessary for your system)
+
This rule can not generate a false positive. This rule simply sets a limit of 1000 arguments in a request.  If this limit is too low for you, then either disable this rule for the domain or increase the limit by following the advice in '''Tuning Recommendations''' below.
  
 +
If you believe this is a true false positive, that is ''the request does not have 1000 arguments'', please report this to our security team.  Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page.
  
'''Description'''
+
'''Please do not report cases where the rule is working correctly.'''
  
This rule simply detects if a single request has more that 2048 arguments.  This rule is designed to help protect your system from certain Denial of Service (DOS) attacks.
+
==Tuning Recommendations==
  
 +
If you wish to tune this rule yourself, please see the [[Tuning the Atomicorp WAF Rules]] page for basic information.  In the case of this rule, if you wished to increase the number of arguments do not modify the rule itself, ASL will overwrite updates to the rules if you tell it to update its rule.  Instead, follow the recommendations on the [[Tuning the Atomicorp WAF Rules]] page, disable this rule globally, and create a custom version of this rule for your system.
  
'''False Positives'''
+
If you do not wish to restrict the number of arguments in a request, just disable this rule.
 +
= Additional Information =
  
This rule has no known false positives.  If you believe this is a false positive, please report this to our security team.  Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page.
+
== Similar Rules ==
  
 +
None.
  
'''Tuning Recommendations'''
+
== Knowledge Base Articles==
  
If you wish to tune this rule yourself, please see the [[Tuning the Atomicorp WAF Rules]] page for basic information.  In the case of this rule, if you wished to increase the number of arguments do not modify the rule itself, ASL will overwrite updates to the rules if you tell it to update its rule.  Instead, follow the recommendations on the [[Tuning the Atomicorp WAF Rules]] page, disable this rule globally, and create a custom version of this rule for your system.
+
None.
  
If you do not wish to restrict the number of arguments in a request, just disable this rule.
+
== Outside References ==
  
'''Similar Rules'''
+
[http://www.exploit-db.com/exploits/18305/]
  
 +
[http://arstechnica.com/business/2011/12/huge-portions-of-web-vulnerable-to-hashing-denial-of-service-attack/]
  
'''Knowledge Base Articles'''
+
== Notes ==
  
 
None.
 
None.
 
'''Outside References'''
 

Latest revision as of 19:24, 3 May 2013

Rule 390707
Status Active
Alert Message Atomicorp.com WAF Rules: Too many arguments in request (max set to 1000, increase as necessary for your system)

Contents

[edit] Description

This rule simply detects if a single request has more that 1000 arguments. This rule is designed to help protect your system from certain Denial of Service (DOS) attacks, such as the PHP Hash DOS attack.

[edit] Troubleshooting

[edit] False Positives

This rule can not generate a false positive. This rule simply sets a limit of 1000 arguments in a request. If this limit is too low for you, then either disable this rule for the domain or increase the limit by following the advice in Tuning Recommendations below.

If you believe this is a true false positive, that is the request does not have 1000 arguments, please report this to our security team. Instructions to report false positives are detailed on the Reporting False Positives wiki page.

Please do not report cases where the rule is working correctly.

[edit] Tuning Recommendations

If you wish to tune this rule yourself, please see the Tuning the Atomicorp WAF Rules page for basic information. In the case of this rule, if you wished to increase the number of arguments do not modify the rule itself, ASL will overwrite updates to the rules if you tell it to update its rule. Instead, follow the recommendations on the Tuning the Atomicorp WAF Rules page, disable this rule globally, and create a custom version of this rule for your system.

If you do not wish to restrict the number of arguments in a request, just disable this rule.

[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

[1]

[2]

[edit] Notes

None.

Personal tools