Skip to content

Commit

Permalink
Focus and better explain 5.3.10 to resolve #1556
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth authored Aug 12, 2024
1 parent 72406ad commit 93b3a35
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion 5.0/en/0x13-V5-Validation-Sanitization-Encoding.md
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ Output encoding close or adjacent to the interpreter in use is critical to the s
| **5.3.7** | Verify that the application protects against LDAP injection vulnerabilities, or that specific security controls to prevent LDAP injection have been implemented. |||| 90 |
| **5.3.8** | Verify that the application protects against OS command injection and that operating system calls use parameterized OS queries or use contextual command line output encoding. |||| 78 |
| **5.3.9** | [DELETED, DUPLICATE OF 12.3.2, 12.3.3] | | | | |
| **5.3.10** | Verify that the application protects against XPath injection or XML injection attacks. |||| 643 |
| **5.3.10** | [MODIFIED] Verify that the application is protected against XPath injection attacks by using query parameterization or precompiled queries. Sanitization can be used if there is no other alternative. |||| 643 |
| **5.3.11** | [ADDED] Verify that the application is protected against CSV and Formula Injection. The application should follow the escaping rules defined in RFC4180 2.6 and 2.7 when exporting CSV files. The application should escape special characters including '=', '+', '-', '@' '\t' (tab) and '\00' (null character) using a single quote, if they are the first character in a field, when exporting CSV files and other spreadsheet formats such as xls, xlsx, odf. |||| 1236 |
| **5.3.12** | [ADDED] Verify that LaTeX processors are configured securely (such as not using the "--shell-escape" flag) and command allow-listing is used to prevent LaTeX injection attacks. | ||| |
| **5.3.13** | [ADDED, SPLIT FROM 5.3.1] Verify that when dynamically building URLs, untrusted data is encoded according to its context (e.g., URL encoding or base64url encoding for query or path parameters). Ensure that only safe URL protocols are permitted (e.g., disallow javascript: or data:). |||| 116 |
Expand Down

0 comments on commit 93b3a35

Please sign in to comment.