Malicious data can be introduced voluntarily (as part of an attack) or involuntarily (e.g. XSS). Some input checks should be dependent upon the function or user's context (e.g. the data is valid for one user but not another). There are many alternatives to this kind of attack:
Tampering request types, URLs, cookies, session identifiers, fields or values that are not validated. Adding, removing or duplicating request fields or values to exploit code behaviour (e.g. mass parameter assignment, parameter pollution, passing partial authentication data). Sending requests that are processed independently of the user activities (stage, amount of requests, privileges). Fuzzing a file input. Depending of the target of the attack, the results of this type of input varies widely:
Information disclosure (error logs, system responses, etc.). Operations tampering (SQLi, eShoplifting). Denial of Service. Spoofing. Code execution. NB: This card relates to context-specific input validation. See VE 3 for the similar generic input validation checks.
Dave can input malicious field names or data because it is not being checked within the context of the current user and process
Owasp ASVS (4.0): 4.2.1 ,5.1.1 ,5.1.2 ,11.1.1 ,11.1.2
Capec: 28 ,31 ,48 ,126 ,162 ,165 ,213 ,220 ,221 ,261
Owasp SCP: 8,10,183
Owasp Appsensor: RE3-6,AE8-11,SE1,SE3-6,IE2-4,HT1-3
Safecode: 24,35
ASVS V4.2 - Operation Level Access Control
ASVS V5.1 - Input Validation Requirements
ASVS V11.1 - Business Logic Security Requirements
Loading comments 0%