This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Don't trust user input"
Cduffey346 (talk | contribs) |
|||
Line 9: | Line 9: | ||
# Describe the principle and how it should be applied to security decisions | # Describe the principle and how it should be applied to security decisions | ||
+ | A user or client will not always submit data your application will expect. By building robust applications that do not trust user input by default, you ensure the application will be able to handle unexpected data gracefully. Examples of user input include: form data, client information such as user-agent strings, cookies, referer, etc. Anything that is submitted in an HTTP request should be considered user input. | ||
==Examples== | ==Examples== | ||
− | === | + | ===Phone number=== |
: A short example description, small picture, or sample code with [http://www.site.com links] | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
Line 27: | Line 28: | ||
==Related [[Controls]]== | ==Related [[Controls]]== | ||
− | * [[ | + | * [[Input Validation]] |
− | |||
Revision as of 19:40, 24 July 2008
This is a principle or a set of principles. To view all principles, please see the Principle Category page.
Last revision (mm/dd/yy): 07/24/2008
Description
A principle is a simple rule that helps to guide security decisions in complex situations.
- Start with a one-sentence description of the principle
- Describe the principle and how it should be applied to security decisions
A user or client will not always submit data your application will expect. By building robust applications that do not trust user input by default, you ensure the application will be able to handle unexpected data gracefully. Examples of user input include: form data, client information such as user-agent strings, cookies, referer, etc. Anything that is submitted in an HTTP request should be considered user input.
Examples
Phone number
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Vulnerabilities
Related Controls