 
                            ...
Failure to sanitize user input before processing or storing it can result in injection attacks.
| Rule | Severity | Likelihood | 
|---|
| Detectable | Repairable | Priority | Level | 
|---|---|---|---|
| IDS16-J | High | Probable | Yes | 
| No | P12 | L1 | 
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| The Checker Framework | 
 | Tainting Checker | Trust and security errors (see Chapter 8) | ||||||
| Fortify | 1.0 | Missing_XML_Validation | Implemented | ||||||
| Klocwork | 
 | JAVA.SV.XML.INVALID | Implemented | ||||||
| Parasoft Jtest | 
| 
 | CERT.IDS16.TDXML | 
| Protect against XML data injection | 
Related Vulnerabilities
CVE-2008-2370 describes a vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16. When a RequestDispatcher is used, Tomcat performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
Related Guidelines
| SEI CERT Perl Coding Standard | IDS33-PL. Sanitize untrusted data passed across a trust boundary | 
| Injection [RST] | |
| CWE-116, Improper Encoding or Escaping of Output | 
Bibliography
| A Guide to Building Secure Web Applications and Web Services | |
| [Seacord 2015] | |
| [W3C 2008] | Section 4.4.3, "Included If Validating" | 
IDS13-J. Use compatible character encodings on both sides of file or network IO
...