WAF 60158

From Atomicorp Wiki
Jump to: navigation, search
Rule 60158
Status Active
Alert Message Wordpress Login attempt failure

Contents

Description

This rule detects when a Wordpress login attempt has failed. The user has failed to provide valid authentication credentials. This may be a wrong password, username, credential, key, One Time Password or any other factor the system requires for successful login.

examples

Rule: 60158 (level 5) -> 'Wordpress Login attempt failure' Src IP: 184.168.46.54 Src Location: US / Arizona [modsecurity] [client 184.168.46.54] [domain atomicorp.com] [200] [/apache/20200811/20200811-2031/20200811-203141-XzM4bErQTRAAAHm2LPYAAABQ] [file "/etc/httpd/modsecurity.d/12_asl_brute.conf"] [line "145"] [id "377305"] [rev "2"] [msg "Atomicorp.com WAF Rules - Login Failure Detection: WordPress Login Attempt Failure "] [severity "WARNING"] [tag "no_ar"] Warning. Pattern match "E(?:rror|RROR)\\: The password you entered for the username" at RESPONSE_BODY.


Troubleshooting

False Positives

There are no known false positives with this rule. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Do not disable this rule.

Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.


Additional Information

Similar Rules

WAF_60159

Knowledge Base Articles

None.

Outside References

None.

Notes

None.

Personal tools