Unchecked_user_input

Improper input validation

Improper input validation

Add article description


Improper input validation[1] or unchecked user input is a type of vulnerability in computer software that may be used for security exploits.[2] This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."[1]

Examples include:


References

  1. "CWE-20: Improper Input Validation". Common Weakness Enumeration. MITRE. December 13, 2010. Retrieved February 22, 2011.
  2. Erickson, Jon (2008). Hacking: the art of exploitation. No Starch Press Series (2, illustrated ed.). Safari Books Online. ISBN 978-1-59327-144-2.

Share this article:

This article uses material from the Wikipedia article Unchecked_user_input, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.