Skip to content

Commit 5fbff8a

Browse files
committed
4.0.1 update
Replace 4.0 PDF, Word, csv with minor changes: - Added Jason Axley as reviewer - Fixed #619 in 5.3 - Remove temporary PPTX
1 parent 6d8491d commit 5fbff8a

6 files changed

+5
-4
lines changed

4.0/OWASP Application Security Verification Standard 4.0-en.csv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ V5,Validation,5.1.3,"Verify that all input (HTML form fields, REST requests, URL
134134
V5,Validation,5.1.4,"Verify that structured data is strongly typed and validated against a defined schema including allowed characters, length and pattern (e.g. credit card numbers or telephone, or validating that two related fields are reasonable, such as checking that suburb and zip/postcode match). ([C5](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering))",X,X,X,20,
135135
V5,Validation,5.1.5,"Verify that URL redirects and forwards only allow whitelisted destinations, or show a warning when redirecting to potentially untrusted content.",X,X,X,601,
136136
V5,Validation,5.2.1,Verify that all untrusted HTML input from WYSIWYG editors or similar is properly sanitized with an HTML sanitizer library or framework feature. ([C5](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)),X,X,X,116,
137-
V5,Validation,5.2.2,Verify that unstructured data is sanitized to enforce safety measures such as allowed characters and length.,,X,X,138,
137+
V5,Validation,5.2.2,Verify that unstructured data is sanitized to enforce safety measures such as allowed characters and length.,X,X,X,138,
138138
V5,Validation,5.2.3,Verify that the application sanitizes user input before passing to mail systems to protect against SMTP or IMAP injection.,X,X,X,147,
139139
V5,Validation,5.2.4,"Verify that the application avoids the use of eval() or other dynamic code execution features. Where there is no alternative, any user input being included must be sanitized or sandboxed before being executed.",X,X,X,95,
140140
V5,Validation,5.2.5,Verify that the application protects against template injection attacks by ensuring that any user input being included is sanitized or sandboxed.,X,X,X,94,
Binary file not shown.
Binary file not shown.

4.0/en/0x01-Frontispiece.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ The Application Security Verification Standard is a list of application security
99
![license](../images/license.png)
1010
Copyright © 2008-2019 The OWASP Foundation. This document is released under the [Creative Commons Attribution ShareAlike 3.0 license](https://creativecommons.org/licenses/by-sa/3.0/). For any reuse or distribution, you must make clear to others the license terms of this work.
1111

12-
Version 4.0, March 2019
12+
Version 4.0.1, March 2019
1313

1414
## Project Leads
1515

@@ -27,6 +27,7 @@ Version 4.0, March 2019
2727
- David Johansson
2828
- Tonimir Kisasondi
2929
- Ron Perris
30+
- Jason Axley
3031
- Abhay Bhargav
3132
- Benedikt Bauer
3233
- Elar Lang

4.0/en/0x13-V5-Validation-Sanitization-Encoding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Properly implemented input validation controls, using positive whitelisting and
2929
| # | Description | L1 | L2 | L3 | CWE |
3030
| :---: | :--- | :---: | :---:| :---: | :---: |
3131
| **5.2.1** | Verify that all untrusted HTML input from WYSIWYG editors or similar is properly sanitized with an HTML sanitizer library or framework feature. ([C5](https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Formal_Numbering)) |||| 116 |
32-
| **5.2.2** | Verify that unstructured data is sanitized to enforce safety measures such as allowed characters and length. | ||| 138 |
32+
| **5.2.2** | Verify that unstructured data is sanitized to enforce safety measures such as allowed characters and length. | ||| 138 |
3333
| **5.2.3** | Verify that the application sanitizes user input before passing to mail systems to protect against SMTP or IMAP injection. |||| 147 |
3434
| **5.2.4** | Verify that the application avoids the use of eval() or other dynamic code execution features. Where there is no alternative, any user input being included must be sanitized or sandboxed before being executed. |||| 95 |
3535
| **5.2.5** | Verify that the application protects against template injection attacks by ensuring that any user input being included is sanitized or sandboxed. |||| 94 |
@@ -39,7 +39,7 @@ Properly implemented input validation controls, using positive whitelisting and
3939

4040
## V5.3 Output encoding and Injection Prevention Requirements
4141

42-
Many of these items are not directly penetration testable (L1), and so although they are critical to the security of any application, they are L2. For all other uses, consider output encoding essential for every application. Failing to output encode will result in an insecure, injectable, and unsafe application, which are testable in V5.2.
42+
Output encoding close or adjacent to the interpreter in use is critical to the security of any application. Typically, output encoding is not persisted, but used to render the output safe in the appropriate output context for immediate use. Failing to output encode will result in an insecure, injectable, and unsafe application.
4343

4444
| # | Description | L1 | L2 | L3 | CWE |
4545
| :---: | :--- | :---: | :---:| :---: | :---: |
Binary file not shown.

0 commit comments

Comments
 (0)