Skip to content

Commit

Permalink
OWASP#1389 relocate ip requirement
Browse files Browse the repository at this point in the history
  • Loading branch information
Elar Lang committed Oct 22, 2024
1 parent 2642a6d commit bb8296e
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 1 deletion.
1 change: 0 additions & 1 deletion 5.0/en/0x10-V1-Architecture.md
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,6 @@ This is a placeholder for future documentation requirements.
| **1.14.4** | [DELETED, NOT IN SCOPE] | | | | |
| **1.14.5** | [DELETED, MOVED TO 10.5.1] | | | | |
| **1.14.6** | [MOVED TO 50.7.2] | | | | |
| **1.14.7** | [ADDED] Verify that the application is able to discern and utilizes the user's true IP address to provide for sensitive functions, including rate limiting and logging. | ||| 348 |

## References

Expand Down
1 change: 1 addition & 0 deletions 5.0/en/0x18-V10-Coding.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ Complying with this section is likely to be operational and continuous.
| **10.4.3** | [ADDED] Verify that JavaScript code is written in a way that prevents prototype pollution, for example, by using Set() or Map() instead of object literals. | ||| |
| **10.4.4** | [MODIFIED, MOVED FROM 5.1.2] Verify that the application has countermeasures to protect against mass assignment attacks by limiting allowed fields per controller and action, e.g. it is not possible to insert or update a field value when it was not intended to be part of that action. |||| 915 |
| **10.4.5** | [ADDED] Verify that the application only returns data which the user has permission to access. For example, the API response does not return a full object with attributes that contain values the user has no permission to access, despite having permission to access the data object itself. |||| |
| **10.4.6** | [ADDED] Verify that the application is able to discern and utilizes the user's true IP address to provide for sensitive functions, including rate limiting and logging. | ||| 348 |

## 10.5 Security Architecture

Expand Down

0 comments on commit bb8296e

Please sign in to comment.