The application must not be subject to input handling vulnerabilities.

From Application Security and Development Security Technical Implementation Guide

Part of SRG-APP-000447

Associated with: CCI-002754

SV-84893r1_rule The application must not be subject to input handling vulnerabilities.

Vulnerability discussion

A common application vulnerability is unpredictable behavior due to improper input validation. This requirement guards against adverse or unintended system behavior caused by invalid inputs, where information system responses to the invalid input may be disruptive or cause the system to fail into an unsafe state.Data received from the user should always be suspected as being malicious and always validated prior to using it as input to the application.Some examples of input methods:- Forms Data- URL parameters- Hidden Fields- Cookies- HTTP Headers or anything in the HTTP request- Client data entry fieldsItems to validate:- Out of range values/Boundary - Data length - Validate types of characters allowed- Whitelist validation for known good data input while denying all other input.Other recommendations include: - Using drop down menus for lists- Validating input on the server, not on the client.If validating on the client, also validate on the server:- Using regular expressions to validate input- Using HTML filter libraries that implement input validation tasks.

Check content

Review the application documentation and interview the application administrator. If working with the developer, request documentation on their development processes and what their standard operating procedure is for sanitizing all application input. Identify the latest vulnerability scan results. Review the scan results and scan configuration settings. Verify the scan was configured to identify input validation vulnerabilities. If the scan results detected high risk vulnerabilities, verify a more recent scan shows remediation of the vulnerabilities is available for examination. Review any risk acceptance documentation that indicates the ISSO has reviewed and accepted the risk. If the vulnerability scan is not configured to test for input validation vulnerabilities if the most recent scan results show that high risk input validation vulnerabilities exist and a documented risk acceptance from the ISSO is not available, or if the scan results do not exist, this is a finding.

Fix text

Follow best practice when accepting user input and verify that all input is validated before the application processes the input. Remediate identified vulnerabilities and obtain documented risk acceptance for those issues that cannot be remediated immediately.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer