SI-10: Information Input Validation
Generated
2019-05-20 15:48:11.984914
Status
Statements
The information system checks the validity of [Assignment: organization-defined information inputs].
STIG
STIG # | Description | Result |
---|---|---|
V-72871 | PostgreSQL must check the validity of all data inputs except those specifically identified by the organization. | skipped |
V-72873 | PostgreSQL and associated applications must reserve the use of dynamic code execution for situations that require it. | skipped |
V-72875 | PostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code i njection attack. | skipped |
V-72907 | When invalid inputs are received, PostgreSQL must behave in a predictable and documented manner that reflects organizational and system objectives. | passed |
Additional Guidance
Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Software applications typically follow well-defined protocols that use structured messages (i.e., commands or queries) to communicate between software modules or system components. Structured messages can contain raw or unstructured data interspersed with metadata or control information. If software applications use attacker-supplied inputs to construct structured messages without properly encoding such messages, then the attacker could insert malicious commands or special characters that can cause the data to be interpreted as control information or metadata. Consequently, the module or component that receives the tainted output will perform the wrong operations or otherwise interpret the data incorrectly. Prescreening inputs prior to passing to interpreters prevents the content from being unintentionally interpreted as commands. Input validation helps to ensure accurate and correct inputs and prevent attacks such as cross-site scripting and a variety of injection attacks.