Skip to content

Commit

Permalink
Add requirement to prevent cookie bombing to resolve #1739 (#1865)
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth authored Feb 8, 2024
1 parent 7a656c5 commit b515492
Showing 1 changed file with 1 addition and 0 deletions.
1 change: 1 addition & 0 deletions 5.0/en/0x13-V5-Validation-Sanitization-Encoding.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ Sometimes input validation is not going to be helpful for security, other times
| **5.1.4** | [GRAMMAR] Verify that structured data is strongly typed and validated against a defined schema including allowed characters, length and pattern (e.g. credit card numbers, e-mail addresses, telephone numbers, or validating that two related fields are reasonable, such as checking that suburb and zipcode match). ([C5](https://owasp.org/www-project-proactive-controls/#div-numbering)) |||| 20 |
| **5.1.5** | Verify that URL redirects and forwards only allow destinations which appear on an allow list, or show a warning when redirecting to potentially untrusted content. |||| 601 |
| **5.1.6** | [MOVED FROM 1.5.3, LEVEL L2 > L1] Verify that input validation is enforced on a trusted service layer. ([C5](https://owasp.org/www-project-proactive-controls/#div-numbering)) |||| 602 |
| **5.1.7** | [ADDED] Verify that untrusted input is validated for length before being included in a cookie (including as part of a JWT) and that the cookie name and value length combined are not over 4096 bytes. | ||| |

## V5.2 Sanitization and Sandboxing

Expand Down

0 comments on commit b515492

Please sign in to comment.