...
Failure to sanitize data passed to a complex subsystem can lead to an injection attack, data integrity issues, and a loss of sensitive data.
Recommendation | Severity | Likelihood |
|---|
Detectable | Repairable | Priority | Level |
|---|---|---|---|
STR02-C | High | Likely | No |
No |
P9 |
L2 |
Automated Detection
Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| Supported by stubbing/taint analysis | |||||||
| CodeSonar |
| IO.INJ.COMMAND | Command |
injection |
string injection |
injection |
injection |
injection | |||
| Coverity | 6.5 | TAINTED_STRING | Fully |
5.0
| implemented | |||||||||
| Helix QAC |
| C2956 | |||||||
| Klocwork |
| NNTS.TAINTED |
| LDRA tool suite |
| 108 D, 109 D | Partially |
| implemented | |||||||||
| Parasoft C/C++test |
| CERT_C-STR02-a | Protect against command injection | ||||||
| Polyspace Bug Finder |
| Checks for:
Rec. partially covered. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
| SEI CERT C++ Coding Standard | VOID STR02-CPP. Sanitize data passed to complex subsystems |
| CERT Oracle Secure Coding Standard for Java | IDS00-J. Prevent SQL injection |
| MITRE CWE | CWE-88, Argument injection or modification CWE-78, Failure to sanitize data into an OS command (aka "OS command injection") |
Bibliography
...
...