A lack of input validation is often the root cause of many security issues. Since the validation needs to be context specific, generic sanitisation routines will not suffice and the developer needs to understand how data are formatted/composed, why the data is being sent, what it is used for and the meaning of the values. This input validation should ensure that
Only the permitted inputs (field/parameter names) are supplied. All the mandatory inputs are supplied. The values associated with the field/parameter name are of the expected format, type, range, length, etc. NB: This card relates to generic input validation. See VE 4 for the similar additional context-specific checks.
Robert can input malicious data because the allowed protocol format is not being checked, or duplicates are accepted, or the structure is not being verified, or the individual data elements are not being validated for format, type, range, length and a whitelist of allowed characters or formats
Owasp ASVS (4.0): 1.5.3 ,5.1.1-5.1.4 ,13.2.1 ,14.1.2 ,14.4.1
Capec: 28 ,48 ,126 ,165 ,213 ,220 ,221 ,261 ,262 ,271 ,272
Owasp SCP:
Owasp Appsensor: RE7-8,AE4-7,IE2-3,CIE1,CIE3-4,HT1-3
Safecode: 3,16,24,35
ASVS V1.5 - Input and Output Architectural Requirements
ASVS V5.1 - Input Validation Requirements
ASVS V13.2 - RESTful Web Service Verification Requirements
ASVS V14.4 - HTTP Security Headers Requirements
Loading comments 0%