logo

089 Lack of data validation - Trust boundary violation


Description

The system mixes trusted and untrusted data in the same data structure or structured message.


Impact

Introduce data into critical data structures, which could lead to some types of injections.


Recommendation

- Prevent the use of untrusted data in critical data structures or structured messages.


Threat

Authenticated attacker from the Internet.


Expected Remediation Time

45 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Requirements


Fixes


Last updated

2024/02/12