Sanitization and Sandboxing

V5.2.1

Verify that all untrusted HTML input from WYSIWYG editors or similar is properly sanitized with an HTML sanitizer library or framework feature. (C5)

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 116

V5.2.2

Verify that unstructured data is sanitized to enforce safety measures such as allowed characters and length.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 138

V5.2.3

Verify that the application sanitizes user input before passing to mail systems to protect against SMTP or IMAP injection.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 147

V5.2.4

Verify that the application avoids the use of eval() or other dynamic code execution features. Where there is no alternative, any user input being included must be sanitized or sandboxed before being executed.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 95

V5.2.5

Verify that the application protects against template injection attacks by ensuring that any user input being included is sanitized or sandboxed.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 94

V5.2.6

Verify that the application protects against SSRF attacks, by validating or sanitizing untrusted data or HTTP file metadata, such as filenames and URL input fields, and uses allow lists of protocols, domains, paths and ports.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 918

V5.2.7

Verify that the application sanitizes, disables, or sandboxes user-supplied Scalable Vector Graphics (SVG) scriptable content, especially as they relate to XSS resulting from inline scripts, and foreignObject.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 159

V5.2.8

Verify that the application sanitizes, disables, or sandboxes user-supplied scriptable or expression template language content, such as Markdown, CSS or XSL stylesheets, BBCode, or similar.

Level 1 required: True

Level 2 required: True

Level 3 required: True

CWE: 94

Disclaimer:

Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.

Github logo View source on GitHub

Loading comments 0%

Provided by dotNET lab

This website is created, hosted and provided by dotNET lab. dotNET lab provides training and guidance on secure software development. Contact us to get in touch!

OWASP Cornucopia

OWASP Cornucopia is originally created by Colin Watson. It is open source and can be downloaded free of charge from the OWASP website. It is is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. OWASP does not endorse or recommend commercial products or services. OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.