DATA VALIDATION & ENCODING (VE4)

Dave can input malicious field names or data because it is not being checked within the context of the current user and process

DATA VALIDATION & ENCODING
4

Dave can input malicious field names or data because it is not being checked within the context of the current user and process

OWASP SCP

8,10,183

OWASP ASVS

4.2.1,5.1.1,5.1.2,11.1.1,11.1.2

OWASP AppSensor

RE3,RE4,RE5,RE6,AE8,AE9,AE10,AE11,SE1,SE3,SE4,SE5,SE6,IE2,IE3,IE4,HT1,HT1,HT2,HT3

CAPEC

-

SAFECODE

24,35

How to play?

Malicious data can be introduced voluntarily (as part of an attack) or involuntarily (e.g. XSS). Some input checks should be dependent upon the function or user's context (e.g. the data is valid for one user but not another). There are many alternatives to this kind of attack:

Tampering request types, URLs, cookies, session identifiers, fields or values that are not validated. Adding, removing or duplicating request fields or values to exploit code behaviour (e.g. mass parameter assignment, parameter pollution, passing partial authentication data). Sending requests that are processed independently of the user activities (stage, amount of requests, privileges). Fuzzing a file input. Depending of the target of the attack, the results of this type of input varies widely:

Information disclosure (error logs, system responses, etc.). Operations tampering (SQLi, eShoplifting). Denial of Service. Spoofing. Code execution. NB: This card relates to context-specific input validation. See VE 3 for the similar generic input validation checks.

Mappings

OWASP ASVS (4.0): 4.2.1 ,5.1.1 ,5.1.2 ,11.1.1 ,11.1.2

Capec: 28 ,31 ,48 ,126 ,162 ,165 ,213 ,220 ,221 ,261

OWASP SCP: 8,10,183

OWASP Appsensor: RE3,RE4,RE5,RE6,AE8,AE9,AE10,AE11,SE1,SE3,SE4,SE5,SE6,IE2,IE3,IE4,HT1,HT1,HT2,HT3

Safecode: 24,35

ASVS (4.0) Cheatsheetseries Index

ASVS V4.2 - Operation Level Access Control

ASVS V5.1 - Input Validation Requirements

ASVS V11.1 - Business Logic Security Requirements

No suitable mappings were found.

Attacks

SQL Injection

Cross-Site Scripting (XSS)

Command Injection

File Upload Vulnerabilities

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.