-
Notifications
You must be signed in to change notification settings - Fork 727
Rule 933210 PHP Injection Attack FP #1626
Comments
@theMiddleBlue do you have any ideas? |
Hi @emphazer the rule tries to catch PHP code injection bypass technique such as thanks! |
I am not sure this is what we want. How about URLs like But I agree we need to do something about the false positive. |
totally agree, didn't think about it. need more time to test :/ |
This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days |
any news here? |
Rule 933210 PHP Injection Attack FP
Type of Issue
Incorrect blocking (false positive)
Description
curl 'localhost/picture(5)(4).jpg'
[msg "PHP Injection Attack: Variable Function Call Found"] [data "Matched Data: (5)(4) found within REQUEST_FILENAME: /picture(5)(4).jpg"]
Your Environment
any ideas?
The text was updated successfully, but these errors were encountered: