This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Talk:Injection Prevention Cheat Sheet"

From OWASP
Jump to: navigation, search
(Query language)
m (Application Protocol)
Line 10: Line 10:
 
:Hmm, SQL Injection is #1 in OWASP top 10 2010 now, but XSS is famous and popular as SQL Injection.  
 
:Hmm, SQL Injection is #1 in OWASP top 10 2010 now, but XSS is famous and popular as SQL Injection.  
 
:'''Q:''' why is XSS missing?
 
:'''Q:''' why is XSS missing?
 +
 +
====Missing, somehow in wiki as from 6-apr-10====
 +
 +
* Application Protocol
 +
:The application protocol, HTTP here, can also be injected. Think of %0d%0a injections in the URL. This may lead to all sorts of HRS (HTTP Response Splitting/Smuggling, HTTP Request Smuggling/Splitting). It may also lead to HTTP header injections for example setting cookies.

Revision as of 17:53, 6 April 2010

Following questions to the wiki as from 6-apr-10

(items are the headlines in the wiki page):

  • A2:
we read: "An already productive application (with MVC architecture) ..."
Q: why is this restricted to MVC? I don't see any reason for that as OpenSource applications must not be MVC.
  • Query languages
we read: "The most famous form of injection is SQL Injection ..."
Hmm, SQL Injection is #1 in OWASP top 10 2010 now, but XSS is famous and popular as SQL Injection.
Q: why is XSS missing?

Missing, somehow in wiki as from 6-apr-10

  • Application Protocol
The application protocol, HTTP here, can also be injected. Think of %0d%0a injections in the URL. This may lead to all sorts of HRS (HTTP Response Splitting/Smuggling, HTTP Request Smuggling/Splitting). It may also lead to HTTP header injections for example setting cookies.