...
Failure to sanitize user input before processing or storing it can result in injection attacks.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
IDS16-J | High | Probable | Yes | NoMedium | P12 | L1 |
Automated Detection
| Tool | Version | Checker | Description | |||||||
|---|---|---|---|---|---|---|---|---|---|---|
| The Checker Framework |
| Tainting Checker | Trust and security errors (see Chapter 8) | |||||||
| Fortify | 1.0 | Missing_XML_Validation | Implemented | |||||||
| Klocwork |
| JAVA.SV.XML.INVALID | Implemented | |||||||
| Parasoft Jtest |
| BDCERT. | SECURITYIDS16.TDXML | Protect against XML data injection |
Related Vulnerabilities
CVE-2008-2370 describes a vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16. When a RequestDispatcher is used, Tomcat performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
...
A Guide to Building Secure Web Applications and Web Services | |
| [Seacord 2015] | IDS00-J. Prevent SQL Injection LiveLesson |
[W3C 2008] | Section 4.4.3, "Included If Validating" |
...
IDS13-J. Use compatible character encodings on both sides of file or network IO