This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Don't trust user input"

From OWASP
Jump to: navigation, search
Line 9: Line 9:
 
# Describe the principle and how it should be applied to security decisions
 
# Describe the principle and how it should be applied to security decisions
  
 +
A user or client will not always submit data your application will expect.  By building robust applications that do not trust user input by default, you ensure the application will be able to handle unexpected data gracefully.  Examples of user input include: form data, client information such as user-agent strings, cookies, referer, etc.  Anything that is submitted in an HTTP request should be considered user input.
  
 
==Examples==
 
==Examples==
  
===Short example name===
+
===Phone number===
 
: A short example description, small picture, or sample code with [http://www.site.com links]
 
: A short example description, small picture, or sample code with [http://www.site.com links]
  
Line 27: Line 28:
 
==Related [[Controls]]==
 
==Related [[Controls]]==
  
* [[Controls 1]]
+
* [[Input Validation]]
* [[Controls 2]]
 
  
  

Revision as of 19:40, 24 July 2008

This is a principle or a set of principles. To view all principles, please see the Principle Category page.

Last revision (mm/dd/yy): 07/24/2008

Description

A principle is a simple rule that helps to guide security decisions in complex situations.

  1. Start with a one-sentence description of the principle
  2. Describe the principle and how it should be applied to security decisions

A user or client will not always submit data your application will expect. By building robust applications that do not trust user input by default, you ensure the application will be able to handle unexpected data gracefully. Examples of user input include: form data, client information such as user-agent strings, cookies, referer, etc. Anything that is submitted in an HTTP request should be considered user input.

Examples

Phone number

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links


Related Vulnerabilities


Related Controls


References