Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A log injection vulnerability arises when a log entry contains unsanitized user input. A malicious user can insert fake log data and consequently deceive system administrators as to the system's behavior [OWASP 2008]. For example, a user might split a legitimate log entry into two log entries by entering a carriage return and line feed (CRLF) sequence, either of which might be misleading. Log injection attacks can be prevented by sanitizing and validating any untrusted input sent to a log.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6a2ca26cc9e3cd4a-7b0c3c79-4f784d31-8aa493e1-66278cb81dc937ff44d92251"><ac:plain-text-body><![CDATA[

[ISO/IEC TR 24772:2010

http://www.aitcnet.org/isai/]

Injection [RST]

]]></ac:plain-text-body></ac:structured-macro>

MITRE CWE

CWE-144. Improper Neutralization of Line Delimiters

 

CWE-150. Improper Neutralization of Escape, Meta, or Control Sequences

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="95a329223686b66f-b27ca87d-4a424167-a3aab9a6-9daddf7fad468da3da2b430a"><ac:plain-text-body><![CDATA[

[[API 2006

AA. Bibliography#API 06]]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2a1b5373e7e3c7ad-45850ba3-49204b0f-a3f59f07-ee36da2ec21eb524ba28c588"><ac:plain-text-body><![CDATA[

[[OWASP 2008

AA. Bibliography#OWASP 08]]

[Log Injection

https://www.owasp.org/index.php/Log_injection]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="51f62e9f8cd49ca1-e3214647-44b143f2-839e9dc8-177356241fa5a646da8ecc9b"><ac:plain-text-body><![CDATA[

[[PCI DSS Standard

https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml]]

]]></ac:plain-text-body></ac:structured-macro>

...