owasp:owasp_top_ten_cheat_sheet
This is an old revision of the document!
OWASP - OWASP Top Ten Cheat Sheet
Issue | Presentation | Solution | Comments |
---|---|---|---|
Injection | Render | Set a correct content type. | All SQL Injection is due to dynamic SQL queries. Strongly consider prohibiting dynamic SQL queries. |
Set safe character set (UTF-8). | Canonicalize using correct character set. | ||
Set correct locale. | |||
On Submit: | Enforce input field type and lengths. | Positive input validation using correct character set. | |
Validate fields and provide feedback. | |||
Ensure option selects and radio contain only sent values. | |||
Weak authentication and session management | Render | Validate user is authenticated. | |
Validate role is sufficient for this view. | Validate role is sufficient to create, read, update, or delete data. | ||
Set “secure” and “HttpOnly” flags for session cookies. | |||
Send CSRF token with forms. | |||
XSS | Render | Set correct content type. | |
Set safe character set (UTF-8). | Canonicalize using correct character set. | ||
Set correct locale. | |||
Output encode all user data as per output context. | |||
Set input constraints. | Positive input validation using correct character set. | ||
Only process data that is 100% trustworthy. Everything else is hostile and should be rejected. | |||
Do not store data HTML-encoded in the database. This prevents new uses for the data. |
owasp/owasp_top_ten_cheat_sheet.1476194917.txt.gz · Last modified: 2020/07/15 09:30 (external edit)