cancel
Showing results for 
Search instead for 
Did you mean: 

Attack Signature Detected "Type="

bcarreker
Cirrus
Cirrus

Hello,

I have some users that are receiving an F5 error page with a session ID. Looks like the WAF detected a false positive. I've included a screenshot of the violation. Has anyone come across this? I am unable to adjust the policy via Traffic Learning, so is it possible to manually make a change in the policy configuration? 

Also, is it strange that the F5 WAF is blocking traffic from this violation, eventhough "Blocking" isn't listed under the "Applied Blocking Settings" from the report?

3 REPLIES 3

Hello,

 

can you share the screenshotsyou are talking about? also, could you please share a screenshot from the policy builiding settings for this policy?

 

Thanks,

Mohamed Salah

Hello,

 

Sorry, didn't notice the attached screenshot. this logs shows that this attack signature wasn't the reason for blocking as only learn and alarm are enabled for this.

So, please can show us the while request along with the policy building settings.

 

Thanks,

Mohamed Salah

bcarreker
Cirrus
Cirrus

I ended up finding the solution. 

Under "Security>Application Security>URLs>Allowed URLs>Allowed HTTP URLs", I added "type = application / script (Parameter) (2)" under the "Overriden Security Policy Settings"

 

This violation is no longer being triggered.