User Tools

Site Tools


owasp:owasp_top_ten_cheat_sheet

This is an old revision of the document!


OWASP - OWASP Top Ten Cheat Sheet

Issue Presentation Solution Comments
Injection Render Set a correct content type. All SQL Injection is due to dynamic SQL queries. Strongly consider prohibiting dynamic SQL queries.
Set safe character set (UTF-8). Canonicalize using correct character set.
Set correct locale.
On Submit: Enforce input field type and lengths. Positive input validation using correct character set.
Validate fields and provide feedback.
Ensure option selects and radio contain only sent values.
Weak authentication and session management Render Validate user is authenticated.
Validate role is sufficient for this view. Validate role is sufficient to create, read, update, or delete data.
Set “secure” and “HttpOnly” flags for session cookies.
Send CSRF token with forms.
XSS Render Set correct content type.
Set safe character set (UTF-8). Canonicalize using correct character set.
Set correct locale.
Output encode all user data as per output context.
Set input constraints. Positive input validation using correct character set. Only process data that is 100% trustworthy. Everything else is hostile and should be rejected.
Do not store data HTML encoded in the database. This prevents new uses for the data.
owasp/owasp_top_ten_cheat_sheet.1476194823.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki