Verify that all application components use the same encodings and parsers to avoid parsing attacks that exploit different URI or file parsing behavior that could be used in SSRF and RFI attacks.
Level 1 required: True
Level 2 required: True
Level 3 required: True
CWE: 116
[DELETED, DUPLICATE OF 4.3.1]
Level 1 required: False
Level 2 required: False
Level 3 required: False
Verify API URLs do not expose sensitive information, such as the API key, session tokens etc.
Level 1 required: True
Level 2 required: True
Level 3 required: True
CWE: 598
Verify that authorization decisions are made at both the URI, enforced by programmatic or declarative security at the controller or router, and at the resource level, enforced by model-based permissions.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 285
Verify that requests containing unexpected or missing content types are rejected with appropriate headers (HTTP response status 406 Unacceptable or 415 Unsupported Media Type).
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 434
Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.
Loading comments 0%