5. of Elevation of Privilege I
An attacker can force data through different validation paths, which give different results.
Threat |
|
You are validating input at different places in your application and not using centralized functions to perform the checks, so there may be differences in the implementation and other pieces of code may be making certain assumptions about those checks. |
|
CAPEC |
CAPEC-80 – Using UTF-8 encoding to bypass validation logic CAPEC-71 – Using Unicode encoding to bypass validation logic CAPEC-64 – Using slashes and URL encoding combined to bypass validation logic |
ASVS |
1.1.6 – Ensure the use of a security kernel |
CWE |
CWE-20 – Improper input validation... |