rspec/rules/S2608/rule.adoc

25 lines
1.0 KiB
Plaintext
Raw Normal View History

Cookie values and the contents of form fields - both visible _and_ hidden - can easily be manipulated by attackers. Therefore, security decisions should not be made based on these inputs.
2021-02-02 15:02:10 +01:00
This rule logs an issue whenever form fields and cookie values are accessed.
== Noncompliant Code Example
2022-02-04 17:28:24 +01:00
[source,text]
----
public void doPost(HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException {
Cookie [] cookies = request.getCookies(); // Noncompliant
String hiddenValue = request.getParameter("hiddenField"); // Noncompliant
Map<String,String[]> params = request.getParameterMap(); // Noncompliant
String [] hiddenFieldValues = reqeust.getParameterValues("hiddenArray"); // Noncompliant
----
== See
* https://owasp.org/Top10/A03_2021-Injection/[OWASP Top 10 2021 Category A4] - Insecure Design
2021-10-28 10:07:16 +02:00
* https://cwe.mitre.org/data/definitions/807.html[MITRE, CWE-807] - Reliance on Untrusted Inputs in a Security Decision
* https://www.sans.org/top25-software-errors/#cat3[SANS Top 25] - Porous Defenses