[Owasp-leaders] The OWASP Periodic Table Project
Eoin
eoin.keary at owasp.org
Tue Mar 5 21:29:39 UTC 2013
You need both.
Eoin Keary
Owasp Global Board
+353 87 977 2988
On 5 Mar 2013, at 22:28, Jim Manico <jim.manico at owasp.org> wrote:
> Good thoughts, Jon. My feedback inline.
>
>> * SQL table names possibly could be escaped, depending upon the dialect in use. They still might need some type of filtering / IV.
>
> Untrusted data landing into a table name, column name or similar space in a query is a design flaw in multiple dimensions. Your query is no longer paramerizable in most languages, and you are exposing system internals to users.
>
>> * SQL identifiers ought to be validated from a known list of acceptable values.
>
> Can you give me an example? I still think this is a design flaw.
>
>> * Full SQL statements probably should have access-controls and anti-CSRF protections in place. (hopefully!)
>
> You are hopping topics, but fair.
>
>> * Other odd ball contexts need their own love, probably along the lines of IV.
>
> Would love to see some examples.
>
> And in general, input validation is great secure coding hygiene practice and does indeed stop some injection (like when validating numeric input that lands in a query). But to stop SQL Injection, it's all about query parametrization (and proper design) for complete defense.
>
> Cheers,
> Jim
>
>>
>> On Mar 5, 2013, at 3:47 PM, Jim Manico wrote:
>>
>>> Input validation is not the right control for SQL Injection, Dennis. https://www.owasp.org/index.php/Query_Parameterization_Cheat_Sheet
>>
>> Input validation (IV) isn't right most of the time. However, if the tainted data is going into a context like a table name, an identifier, or other non-parameterizable contexts then something needs to occur:
>> * SQL table names possibly could be escaped, depending upon the dialect in use. They still might need some type of filtering / IV.
>> * SQL identifiers ought to be validated from a known list of acceptable values.
>> * Full SQL statements probably should have access-controls and anti-CSRF protections in place. (hopefully!)
>> * Other odd ball contexts need their own love, probably along the lines of IV.
>>
>>
>>> But otherwise you are right on. What you describe below is the direction I think James will be taking this.
>>>
>>> Definitely a project to watch in my opinion.
>>>
>>> Aloha,
>>>
>>> - Jim Manico
>>> @Manicode
>>>
>>>
>>>> On 5 Mar 2013, at 20:35, Eoin wrote:
>>>>
>>>>> So the periodic table is a list of vulns right? Best we share the work
>>>>> we did on the owasp common numbering system?
>>>>
>>>> Not a list of vulns, the periodic table is a taxonomy of similarities.
>>>> Gases, liquids, solids etc… I imagine a taxonomy of vulns: input
>>>> validation, authorisation, access control, etc.. (the top 10 controls?)
>>>> Within the taxonomy of gasses are air, and helium for example. I further
>>>> imagine that input validation will have XSS & SQLi for example. I would
>>>> further imagine that the OWASP periodic table has its own shape that
>>>> doesn't much resemble the actual periodic table…
>>>>
>>>> so I see it as a project to group known issues according to related root
>>>> causes.
>>>>
>>>> Is this how others view this project?
>>>>
>>>>
>>>>
>>>> Dennis
>>>
>>> _______________________________________________
>>> OWASP-Leaders mailing list
>>> OWASP-Leaders at lists.owasp.org
>>> https://lists.owasp.org/mailman/listinfo/owasp-leaders
>
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders
More information about the OWASP-Leaders
mailing list