Skip to content

Commit

Permalink
Move 5.1.3 positive validation to 11.3.1
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth committed Jan 2, 2025
1 parent c0b6242 commit 4f1470c
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 1 deletion.
2 changes: 1 addition & 1 deletion 5.0/en/0x13-V5-Validation-Sanitization-Encoding.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ Input validation provides valuable hygiene for the application in making sure th
| :---: | :--- | :---: | :---: | :---: | :---: |
| **5.1.1** | [MOVED TO 10.4.7] | | | | |
| **5.1.2** | [MOVED TO 10.4.4] | | | | |
| **5.1.3** | [MODIFIED] Verify that all input is validated using positive validation, against an allowed list of values, patterns or ranges to enforce business or functional expectations for that input. | ||| 20 |
| **5.1.3** | [MOVED TO 11.3.1] | | | | |
| **5.1.4** | [MODIFIED, SPLIT TO 5.1.7] Verify that data items with an expected structure are validated according to the pre-defined rules. |||| 20 |
| **5.1.5** | [MODIFIED, SPLIT TO 50.8.1] Verify that the application will only automatically redirect the user to a different URL directly from an application URL where the destination appears on an allowlist. |||| 601 |
| **5.1.6** | [ADDED] Verify that the application validates that user-controlled input in HTTP request header fields does not exceed the server's maximum header field size limit (usually 4kB or 8kB) to prevent client-based denial of service attacks. | ||| |
Expand Down
6 changes: 6 additions & 0 deletions 5.0/en/0x19-V11-BusLogic.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,12 @@ Business logic security is so individual to every application that no one checkl
| **11.2.1** | [MODIFIED, MOVED FROM 11.1.2, LEVEL L1 > L3] Verify that business logic processes require realistic human timing, preventing excessively rapid transaction submissions. | | || 799 |
| **11.2.2** | [MODIFIED, MOVED FROM 11.1.4, LEVEL L1 > L2] Verify that anti-automation controls are in place to protect against excessive calls to application functions that could lead to data exfiltration, garbage data creation, quota exhaustion, rate limit breaches, denial of service, or overuse of costly resources. | ||| 770 |

## 11.3 Input Validation

| # | Description | L1 | L2 | L3 | CWE |
| :---: | :--- | :---: | :---: | :---: | :---: |
| **11.3.1** | [MODIFIED, MOVED FROM 5.1.3] Verify that input which is used to make business or security decisions is validated using positive validation, against an allowed list of values, patterns or ranges to enforce business or functional expectations for that input. For L2, input validation should be implemented globally. |||| 20 |

## References

For more information, see also:
Expand Down

0 comments on commit 4f1470c

Please sign in to comment.