Created on
05-21-2025
04:31 AM
Edited on
07-24-2025
04:31 AM
By
Stephen_G
| Description | This article describes about why a web traffic could be blocked by FortiWeb signature 060050014 and to solve it. |
| Scope | FortiWeb. |
| Solution |
In Attack logs, it is possible to check blocked traffic related with FortiWeb signature 060050014, which show a message like this: 'Cookie(_clck) triggered signature ID 060050014 of Signatures policy...', and match with patterns like '|ftp', ';ftp' or other ftp-related:
This situation is related with cookies _clck and _clsk. Checking the Cookies details in the Attack logs, _clck and _clsk cookies contain 'ftp' pattern:
Description about signature ID 060050014 is: 'This signature prevents attackers from performing Command injection attacks using 'ftp' command. This attack can be achieved in HTTP request URL and arguments.' Based on this, any cookies, such as _clck or _clsk, that include '|ftp', ';ftp', or other ftp-related payloads may trigger this signature.
Cookies _clck and _clsk are associated with Microsoft Clarity. Microsoft Clarity requires setting cookies on visitors' browsers; these cookies are placed by the setup script installed to run Clarity. When installed, Clarity's cookies send non-personally identifiable information about users; this suggests that Microsoft Clarity may be active on the website and could be triggering certain security rules, depending on how it is used.
To solve this, take the following steps:
Related notes: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.