DATA VALIDATION & ENCODING (VEQ)

Xavier can inject data into a client or device side interpreter because a parameterised interface is not being used, or has not been implemented correctly, or the data has not been encoded correctly for the context, or there is no restrictive policy on code or data includes

DATA VALIDATION & ENCODING
Q

Xavier can inject data into a client or device side interpreter because a parameterised interface is not being used, or has not been implemented correctly, or the data has not been encoded correctly for the context, or there is no restrictive policy on code or data includes

OWASP SCP

10,15,16,19,20

OWASP ASVS

5.2.1,5.2.5,5.3.3,5.5.4

OWASP AppSensor

IE1,RP3

CAPEC

-

SAFECODE

2,17

How to play?

Due a failure of client-side input or output validation, encoding or sanitization, malicious code can be injected and treated as code rather than data, leading to code execution in the client application.

NB: This relates to actual exploitation of an injection vulnerability on the client-side. See VE K for the same attack server-side, and other cards in this suit for individual data validation and encoding issues (e.g. missing/by-passable/badly-implemented input/output validation, encoding or sanitization).

Mappings

OWASP ASVS (4.0): 5.2.1 ,5.2.5 ,5.3.3 ,5.5.4

Capec: 28 ,31 ,152 ,160 ,468

OWASP SCP: 10,15,16,19,20

OWASP Appsensor: IE1,RP3

Safecode: 2,17

ASVS (4.0) Cheatsheetseries Index

ASVS V5.2 - Sanitization and Sandboxing Requirements

ASVS V5.3 - Output encoding and Injection Prevention Requirements

ASVS V5.5 - Deserialization Prevention Requirements

No suitable mappings were found.

Attacks

SQL Injection

Cross-Site Scripting (XSS)

Command Injection

(Session) Data tampering

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.