25 lines
1.1 KiB
Plaintext
25 lines
1.1 KiB
Plaintext
Validation is the first line of defense against injection, cross-site scripting, and many other attacks. Omitting it in modern web applications is simply negligent.
|
|
|
|
|
|
When creating a Struts ``++ActionForm++``, you have the choice of extending something from the ``++org.apache.struts.action++`` package, or extending something from the ``++org.apache.struts.validator++`` package. Since you can't use the Struts validator capabilities without extending something from the ``++validator++`` package, that should always be your choice.
|
|
|
|
== Noncompliant Code Example
|
|
|
|
----
|
|
public class MyForm extends org.apache.struts.action.ActionForm { // Noncompliant
|
|
// ...
|
|
----
|
|
|
|
== Compliant Solution
|
|
|
|
----
|
|
public class MyForm extends org.apache.struts.validator.ValidatorForm {
|
|
// ...
|
|
----
|
|
|
|
== See
|
|
|
|
* https://www.owasp.org/index.php/Top_10-2017_A1-Injection[OWASP Top 10 2017 Category A1] - Injection
|
|
* https://www.owasp.org/index.php/Top_10-2017_A7-Cross-Site_Scripting_(XSS)[OWASP Top 10 2017 Category A7] - Cross-Site Scripting (XSS)
|
|
* https://cwe.mitre.org/data/definitions/104.html[MITRE, CWE-104] - Struts: Form Bean Does Not Extend Validation Class
|